-
1
-
-
0003092378
-
A calculus for cryptographic protocols: the spi calculus
-
Abadi M., and Gordon A.D. A calculus for cryptographic protocols: the spi calculus. Inform. Comput. 148 (1999) 1-70
-
(1999)
Inform. Comput.
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Abadi M., and Rogaway P. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology 15 2 (2002) 103-127
-
(2002)
J. Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
26444497860
-
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Heám, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, L. Vigneron, The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, in: Proc. CAV'05, Lecture Notes in Computer Science, Vol. 3576, Springer, Berlin, 2005, pp. 281-285.
-
-
-
-
4
-
-
84937567009
-
-
A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Mödersheim, M. Rusinowitch, M. Turuani, L. Viganò, L. Vigneron, The AVISS security protocol analysis tool, in: Proc. CAV'02, Lecture Notes in Computer Science, Vol. 2404, Springer, Berlin, 2002, pp. 349-354.
-
-
-
-
5
-
-
0031650188
-
-
N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proc. IEEE Symp. on Research in Security and Privacy, IEEE Computer Society Press, Silver Spring, MD, 1998, pp. 86-99.
-
-
-
-
6
-
-
0009956081
-
-
D. Basin, G. Denker, Maude versus Haskell: an experimental comparison in security protocol analysis, in: Proc. WRLA'00, ENTCS, Vol. 36, 2001, pp. 235-256.
-
-
-
-
8
-
-
0034822279
-
-
B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, in: Proc. CSFW'01, IEEE Computer Society Press, Silver Spring, MD, 2001, pp. 82-96.
-
-
-
-
9
-
-
24144452823
-
Static validation of security protocols
-
Bodei C., Buchholtz M., Degano P., Nielson F., and Riis Nielson H. Static validation of security protocols. J. Comput. Security 13 3 (2005) 347-390
-
(2005)
J. Comput. Security
, vol.13
, Issue.3
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Riis Nielson, H.5
-
10
-
-
84874713281
-
-
M. Boreale, M.G. Buscemi, A framework for the analysis of security protocols, in: Proc. CONCUR 2002, Lecture Notes in Computer Science, Vol. 2421, Springer, Berlin, 2002, pp. 483-498.
-
-
-
-
11
-
-
85025425124
-
-
S. Brackin, C. Meadows, J. Millen, CAPSL interface for the NRL protocol analyzer, in: Proc. ASSET'99, IEEE Computer Society Press, Silver Spring, MD, 1999.
-
-
-
-
12
-
-
33646198427
-
-
S. Briais, U. Nestmann, A formal semantics for protocol narrations, in: Proc. TGC'05, Lecture Notes in Computer Science, Vol. 3705, Springer, Berlin, 2005, pp. 163-181.
-
-
-
-
14
-
-
23144446730
-
-
C. Caleiro, L. Viganò, D. Basin, Deconstructing Alice and Bob, in: Proc. ARSPA'05, ENTCS, Vol. 135(1), 2005, pp. 3-22.
-
-
-
-
15
-
-
14044252798
-
-
C. Caleiro, L. Viganò, D. Basin, Metareasoning about security protocols using distributed temporal logic, in: Proc. ARSPA'04, ENTCS, Vol. 125(1), 2005, pp. 67-89.
-
-
-
-
16
-
-
33750428466
-
-
Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, J. Mantovani, S. Mödersheim, L. Vigneron, A high level protocol specification language for industrial security-sensitive protocols, in: Proc. SAPS'04, Austrian Computer Society, 2004, pp. 193-205.
-
-
-
-
17
-
-
18544380224
-
An NP decision procedure for protocol insecurity with XOR
-
Chevalier Y., Küsters R., Rusinowitch M., and Turuani M. An NP decision procedure for protocol insecurity with XOR. Theor. Comput. Sci. 338 1-3 (2005) 247-274
-
(2005)
Theor. Comput. Sci.
, vol.338
, Issue.1-3
, pp. 247-274
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
18
-
-
33750480768
-
-
J. Clark, J. Jacob, A survey of authentication protocol literature: version 1.0, 17. November 1997, URL: 〈www.cs.york.ac.uk/~jac/papers/ www.drareview.ps.gz〉.
-
-
-
-
19
-
-
33750457558
-
-
H. Comon-Lundh, V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, in: Proc. LICS'03, IEEE Computer Society Press, Silver Spring, MD, 2003.
-
-
-
-
20
-
-
84958742278
-
-
R. Corin, S. Etalle, An improved constraint-based system for the verification of security protocols, in: Proc. SAS'02, Lecture Notes in Computer Science, Vol. 2477, Springer, Berlin, 2002.
-
-
-
-
21
-
-
84877781491
-
-
F. Crazzolara, G. Winskel, Composing strand spaces, in: Proc. FST TCS 2002, Lecture Notes in Computer Science, Vol. 2556, Springer, Berlin, 2002, pp. 97-108.
-
-
-
-
22
-
-
33750458570
-
-
C. Cremers, Scyther documentation, 〈http://www.win.tue.nl/~ccremers/scyther〉.
-
-
-
-
23
-
-
0035393979
-
LSCs: breathing life into message sequence charts
-
Damm W., and Harel D. LSCs: breathing life into message sequence charts. Formal Methods in System Design 19 1 (2001) 45-80
-
(2001)
Formal Methods in System Design
, vol.19
, Issue.1
, pp. 45-80
-
-
Damm, W.1
Harel, D.2
-
24
-
-
33750443127
-
-
G. Denker, J. Millen, H. Rueß, The CAPSL integrated protocol environment, Technical Report SRI-CSL-2000-02, SRI International, Menlo Park, CA, 2000.
-
-
-
-
25
-
-
0020720357
-
On the security of public key protocols
-
Dolev D., and Yao A. On the security of public key protocols. IEEE Trans. Inform. Theory 29 2 (1983) 198-208
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
26
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
Durgin N., Mitchell J.C., and Pavlovic D. A compositional logic for proving security properties of protocols. J. Comput. Security 11 (2003) 677-721
-
(2003)
J. Comput. Security
, vol.11
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
27
-
-
0034835462
-
-
A.D. Gordon, A. Jeffrey, Authenticity by typing for security protocols, in: Proc. CSFW'01, IEEE Computer Society Press, Silver Spring, MD, 2001, pp. 145-159.
-
-
-
-
28
-
-
33750454331
-
-
C. Haack, A. Jeffrey, Pattern-matching spi-calculus, in: Proc. FAST'04, IFIP series 173, Kluwer Academic Press, Dordrecht, 2004, pp. 193-205.
-
-
-
-
29
-
-
3142594319
-
On the relationship between strand spaces and multi-agent systems
-
Halpern J.Y., and Pucella R. On the relationship between strand spaces and multi-agent systems. ACM Trans. Inform. System Security 6 1 (2003) 43-70
-
(2003)
ACM Trans. Inform. System Security
, vol.6
, Issue.1
, pp. 43-70
-
-
Halpern, J.Y.1
Pucella, R.2
-
30
-
-
33750471477
-
-
ITU-T Recommendation Z.120: Message Sequence Chart (MSC), 2000.
-
-
-
-
31
-
-
84956860311
-
-
F. Jacquemard, M. Rusinowitch, L. Vigneron, Compiling and verifying security protocols, in: Proc. LPAR 2000, Lecture Notes in Computer Science, Vol. 1955, Springer, Berlin, 2000, pp. 131-160.
-
-
-
-
32
-
-
0031633395
-
Casper: a compiler for the analysis of security protocols
-
Lowe G. Casper: a compiler for the analysis of security protocols. J. Comput. Security 6 1 (1998) 53-84
-
(1998)
J. Comput. Security
, vol.6
, Issue.1
, pp. 53-84
-
-
Lowe, G.1
-
33
-
-
33750429494
-
-
S. Mauw, M. Reniers, T. Willemse, Message sequence charts in the software engineering process, in: Handbook of Software Engineering and Knowledge Engineering, World Scientific Publishing Co., Singapore, 2001, pp. 437-463.
-
-
-
-
34
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: emerging issues and trends
-
Meadows C. Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Comm. 21 1 (2003) 44-54
-
(2003)
IEEE J. Sel. Areas Comm.
, vol.21
, Issue.1
, pp. 44-54
-
-
Meadows, C.1
-
35
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L. The inductive approach to verifying cryptographic protocols. J. Comput. Security 6 (1998) 85-128
-
(1998)
J. Comput. Security
, vol.6
, pp. 85-128
-
-
Paulson, L.1
-
36
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L.M. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21 2 (1978) 120-126
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
37
-
-
0003547470
-
-
Addison-Wesley, Reading, MA
-
Rumbaugh P., Jacobson I., and Booch G. The Unified Modeling Language Reference Manual (1999), Addison-Wesley, Reading, MA
-
(1999)
The Unified Modeling Language Reference Manual
-
-
Rumbaugh, P.1
Jacobson, I.2
Booch, G.3
-
38
-
-
0003777431
-
-
Addison-Wesley, Reading, MA
-
Ryan P., Schneider S., Goldsmith M., Lowe G., and Roscoe B. Modelling and Analysis of Security Protocols (2000), Addison-Wesley, Reading, MA
-
(2000)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
39
-
-
0035072287
-
Athena: a novel approach to efficient automatic security protocol analysis
-
Song D., Berezin S., and Perrig A. Athena: a novel approach to efficient automatic security protocol analysis. J. Comput. Security 9 (2001) 47-74
-
(2001)
J. Comput. Security
, vol.9
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
41
-
-
33646227667
-
-
L. Viganò, Automated security protocol analysis with the AVISPA tool, in: Proc. MFPS'05, ENTCS, Vol. 155, 2006, pp. 61-86.
-
-
-
-
42
-
-
33750453978
-
-
Wikipedia: Alice and Bob, URL: 〈www.wikipedia.org/wiki/Alice_and_Bob〉.
-
-
-
|