-
2
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
January
-
Abadi, M. and Needham, R. M.: Prudent engineering practice for cryptographic protocols, IEEE Trans. Softw. Eng. 22(1) (January 1996), 6-15.
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.M.2
-
3
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
E. Snekkenes and D. Gollmann (eds.), Proc. 8th Eur. Symp. on Res. in Comp. Sec., Springer
-
Basin, D., Mödersheim, S. and Viganò, L.: An on-the-fly model-checker for security protocol analysis, in E. Snekkenes and D. Gollmann (eds.), Proc. 8th Eur. Symp. on Res. in Comp. Sec., Volume 2000 of Lecture Notes in Comp. Sci., Springer, 2003, pp. 253-270.
-
(2003)
Lecture Notes in Comp. Sci.
, vol.2000
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
4
-
-
0037237984
-
Inductive verification of smart card protocols
-
Bella, G.: Inductive verification of smart card protocols, J. Comput. Secur. 11(1) (2003), 87-132.
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.1
, pp. 87-132
-
-
Bella, G.1
-
5
-
-
0038011251
-
The verification of an industrial payment protocol: The SET purchase phase
-
V. Atluri (ed.), ACM
-
Bella, G., Massacci, F. and Paulson, L. C.: The verification of an industrial payment protocol: The SET purchase phase, in V. Atluri (ed.), 9th ACM Conf. on Comp. and Comm. Sec., ACM, 2002, pp. 12-20.
-
(2002)
9th ACM Conf. on Comp. and Comm. Sec.
, pp. 12-20
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
6
-
-
0037250327
-
Verifying the SET registration protocols
-
Bella, G., Massacci, F. and Paulson, L. C.: Verifying the SET registration protocols, IEEE J. Sel. Areas Commun. 21(1) (2003), 77-87.
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.1
, pp. 77-87
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
7
-
-
14844323149
-
An overview of the verification of SET
-
Bella, G., Massacci, F. and Paulson, L. C.: An overview of the verification of SET, Int. J. Inf. Secur. 4(1-2) (2005), 17-28.
-
(2005)
Int. J. Inf. Secur.
, vol.4
, Issue.1-2
, pp. 17-28
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
8
-
-
84944035753
-
Formal verification of cardholder registration in SET
-
F. Cuppens, Y. Deswarte, D. Gollman and M. Waidner (eds.), Computer Security - ESORICS 2000, Springer
-
Bella, G., Massacci, F., Paulson, L. C. and Tramontano, P.: Formal verification of cardholder registration in SET, in F. Cuppens, Y. Deswarte, D. Gollman and M. Waidner (eds.), Computer Security - ESORICS 2000, volume 1895 of Lecture Notes in Comp. Sci., Springer, 2000, pp. 159-174.
-
(2000)
Lecture Notes in Comp. Sci.
, vol.1895
, pp. 159-174
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
Tramontano, P.4
-
11
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
Durgin, N., Mitchell, J. and Pavlovic, D.: A compositional logic for proving security properties of protocols, J. Comput. Secur. 11(4) (2004), 677-721.
-
(2004)
J. Comput. Secur.
, vol.11
, Issue.4
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.2
Pavlovic, D.3
-
12
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
Fábrega, F. J. T., Herzog, J. C. and Guttman, J. D.: Strand spaces: Proving security protocols correct, J. Comp. Secur. 7 (1999), 191-220.
-
(1999)
J. Comp. Secur.
, vol.7
, pp. 191-220
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
13
-
-
0029713154
-
What do we mean by entity authentication?
-
IEEE Comp. Society Press
-
Gollmann, D.: What do we mean by entity authentication? in Proc. 15th IEEE Symp. on Security and Privacy, IEEE Comp. Society Press, 1996, pp. 46-54.
-
(1996)
Proc. 15th IEEE Symp. on Security and Privacy
, pp. 46-54
-
-
Gollmann, D.1
-
15
-
-
18444377006
-
Security goals: Packet trajectories and strand spaces
-
R. Focardi and F. Gorrieri (eds.), Foundations of Security Analysis and Design - Tutorial Lectures, Springer
-
Guttman, J.: Security goals: Packet trajectories and strand spaces, in R. Focardi and F. Gorrieri (eds.), Foundations of Security Analysis and Design - Tutorial Lectures, volume 2171 of Lecture Notes in Comp. Sci., Springer, 2001, pp. 197-261.
-
(2001)
Lecture Notes in Comp. Sci.
, vol.2171
, pp. 197-261
-
-
Guttman, J.1
-
17
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Comp. Society Press
-
Löwe, G.: A hierarchy of authentication specifications, in Proc. 10th IEEE Comp. Sec. Found. Workshop, IEEE Comp. Society Press, 1997, pp. 31-43.
-
(1997)
Proc. 10th IEEE Comp. Sec. Found. Workshop
, pp. 31-43
-
-
Löwe, G.1
-
18
-
-
0035067667
-
Fault-preserving simplifying transformations for security protocols
-
Lowe, G. and Hui, M. L.: Fault-preserving simplifying transformations for security protocols, J. Comput. Secur. 9 (2001), 3-46.
-
(2001)
J. Comput. Secur.
, vol.9
, pp. 3-46
-
-
Lowe, G.1
Hui, M.L.2
-
23
-
-
0032630725
-
Analysis of the Internet key exchange protocol using the NRE protocol analyzer
-
IEEE Comp. Society Press
-
Meadows, C.: Analysis of the Internet Key Exchange protocol using the NRE Protocol Analyzer, in SSP-99, IEEE Comp. Society Press, 1999, pp. 216-231.
-
(1999)
SSP-99
, pp. 216-231
-
-
Meadows, C.1
-
24
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: Emerging issues and trends
-
Meadows, C.: Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1) (2003), 44-54.
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.1
, pp. 44-54
-
-
Meadows, C.1
-
25
-
-
84958035071
-
A formal specification of requirements for payment transactions in the SET protocol
-
R. Hirschfeld, (ed.), Proc. Financial Cryptography 98, Springer
-
Meadows, C. and Syverson, P.: A formal specification of requirements for payment transactions in the SET protocol, in R. Hirschfeld, (ed.), Proc. Financial Cryptography 98, volume 1465 of Lecture Notes in Comp. Sci. Springer, 1998.
-
(1998)
Lecture Notes in Comp. Sci.
, vol.1465
-
-
Meadows, C.1
Syverson, P.2
-
29
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L. C.: The inductive approach to verifying cryptographic protocols, J. Comput. Secur. 6 (1998), 85-128.
-
(1998)
J. Comput. Secur.
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
30
-
-
0013087577
-
A generic tableau prover and its integration with Isabelle
-
Paulson, L. C.: A generic tableau prover and its integration with Isabelle, J. Univers. Comput. Sci. 5(3) (1999), 73-87.
-
(1999)
J. Univers. Comput. Sci.
, vol.5
, Issue.3
, pp. 73-87
-
-
Paulson, L.C.1
-
31
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
Paulson, L. C.: Inductive analysis of the internet protocol TLS, ACM Trans. Inf. Syst. Secur. 2(3) (1999), 332-351.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
32
-
-
33750237967
-
-
Quisquater, J.-J., Deswarte, Y., Meadows, C. and Gollmann, D. (eds.), Computer Security - ESORICS 98, Springer
-
Quisquater, J.-J., Deswarte, Y., Meadows, C. and Gollmann, D. (eds.), Computer Security - ESORICS 98, volume 1485 of Lecture Notes in Comp. Sci. Springer, 1998.
-
(1998)
Lecture Notes in Comp. Sci.
, vol.1485
-
-
|