-
1
-
-
0003092378
-
A calculus for cryptographic protocols: the spi calculus
-
Abadi M., and Gordon A.D. A calculus for cryptographic protocols: the spi calculus. Inform. and Comput. 148 1 (1999) 1-70
-
(1999)
Inform. and Comput.
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
0037421015
-
A new logic for electronic commerce protocols
-
Adi K., Debbabi M., and Mejri M. A new logic for electronic commerce protocols. Theoret. Comput. Sci. 291 (2003) 223-283
-
(2003)
Theoret. Comput. Sci.
, vol.291
, pp. 223-283
-
-
Adi, K.1
Debbabi, M.2
Mejri, M.3
-
3
-
-
26444497860
-
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, L. Cuellar, P.H. Drielsma, P. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, L. Vigneron, The AVISPA tool for the automated validation of internet security protocols and applications. in: Proc. of CAV'2005, Lecture Notes in Computer Science, Vol. 3576, Springer, Berlin, 2005, pp. 281-285
-
-
-
-
4
-
-
33750468548
-
-
C. Boyd. Towards extensional goals in authentication protocols, in: Proc. DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997.
-
-
-
-
6
-
-
33750487698
-
-
C.J.F. Cremers, Scyther documentation, 2004 〈 http://www.win.tue.nl/~ccremers/scyther〉.
-
-
-
-
7
-
-
24944514681
-
-
C.J.F. Cremers, S. Mauw, Operational semantics of security protocols, in: S. Leue, T. Systä (Eds.), Scenarios: Models, Transformations and Tools, International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers, Lecture Notes in Computer Science, Vol. 3466, Springer, Berlin, 2005.
-
-
-
-
9
-
-
33750461508
-
-
FET Open Project IST-2001-39252. AVISPA: Automated validation of internet security protocols and applications, 2003, 〈http://www.avispa-project.org/〉.
-
-
-
-
11
-
-
33750493809
-
-
R. Focardi, F. Martinelli, A uniform approach for the definition of security properties, in: World Congr. on Formal Methods, Vol. 1, 1999, pp. 794-813.
-
-
-
-
12
-
-
84937389998
-
-
T. Genet, F. Klay, Rewriting for cryptographic protocol verification, in: Conf. on Automated Deduction, Lecture Notes on Artificial Intelligence, Vol. 1831, 2000, pp. 271-290.
-
-
-
-
13
-
-
0029713154
-
-
D. Gollmann, What do we mean by entity authentication, in Proc. Symp. on Research in Security and Privacy, IEEE, New York, 1996, pp. 46-54.
-
-
-
-
14
-
-
85055795738
-
-
L. Gong, Variations on the themes of message freshness and replay-or the difficulty of devising formal methods to analyze cryptographic protocols, in: Proc. Computer Security Foundations Workshop VI, IEEE Computer Society Press, Silver Spring, MD, 1993, pp. 131-136.
-
-
-
-
15
-
-
0037076868
-
Authentication tests and the structure of bundles
-
Guttman J.D., and Thayer F.J. Authentication tests and the structure of bundles. Theoret. Comput. Sci. 283 2 (2002) 333-380
-
(2002)
Theoret. Comput. Sci.
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Thayer, F.J.2
-
16
-
-
33750442057
-
-
International Organization for Standardization, Information technology-security techniques-entity authentication-Part 1: General model, ISO/IEC 9798-1, September 1991.
-
-
-
-
17
-
-
33750487033
-
-
ITU-TS, Recommendation Z.120: Message Sequence Chart (MSC), ITU-TS, Geneva, 1999.
-
-
-
-
18
-
-
33750461507
-
-
A. Jeffrey, A. Gordon, Typing one-to-one and one-to-many correspondences in security protocols. in: M. Okada, B.C. Pierce, A. Scedrov, H. Tokuda, A. Yonezawa (Eds.), Proc. of ISSS '02, Lecture Notes in Computer Science, Vol. 2514, 2002, pp. 418-434.
-
-
-
-
19
-
-
0013090419
-
-
S.T. Kent, Encryption-based protection for interactive user/computer communication, in: SIGCOMM'77 Proc. Fifth Symposium on Data Communications, NY, USA, 1977, ACM Press, New York, pp. 5.7-5.13.
-
-
-
-
20
-
-
0342658605
-
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: T. Margaria, B. Steffen (Eds.), Proc. of TACAS '96, Lecture Notes in Computer Science, Vol. 1055, 1996, pp. 147-166.
-
-
-
-
21
-
-
84882791488
-
-
G. Lowe, Casper: a compiler for the analysis of security protocols, in: Proc. of CSFW '97, Rockport, IEEE, New York, 1997, pp. 18-30.
-
-
-
-
22
-
-
84994742813
-
-
G. Lowe, A hierarchy of authentication specifications, in: Proc. of CSFW '97, Rockport, IEEE, New York, 1997, pp. 31-44.
-
-
-
-
24
-
-
0013456359
-
Comments on the s/key user authentication scheme
-
Mitchell C.J., and Chen L. Comments on the s/key user authentication scheme. SIGOPS Oper. Systems Rev. 30 4 (1996) 12-16
-
(1996)
SIGOPS Oper. Systems Rev.
, vol.30
, Issue.4
, pp. 12-16
-
-
Mitchell, C.J.1
Chen, L.2
-
25
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Commun. ACM 21 (1978) 120-126
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Needham, R.1
Schroeder, M.2
-
26
-
-
0018683804
-
Encryption and secure computer networks
-
Popek G.J., and Kline C.S. Encryption and secure computer networks. ACM Comput. Survey 11 4 (1979) 331-356
-
(1979)
ACM Comput. Survey
, vol.11
, Issue.4
, pp. 331-356
-
-
Popek, G.J.1
Kline, C.S.2
-
27
-
-
0029713842
-
-
A.W. Roscoe, Intensional Specifications of Security Protocols, in: Proc. of CSFW '96, IEEE, New York, 1996, pp. 28-38.
-
-
-
-
28
-
-
0003777431
-
-
Addison Wesley, Reading, MA
-
Ryan P., Schneider S., Goldsmith M., Lowe G., and Roscoe B. Modelling and Analysis of Security Protocols (2000), Addison Wesley, Reading, MA
-
(2000)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
29
-
-
33750489970
-
-
Security protocols open repository, 〈http://www.lsv.ens-cachan.fr/spore〉.
-
-
-
-
30
-
-
0032678887
-
-
D. Song, Athena: a new efficient automatic checker for security protocol analysis, in: Proc. CSFW '99, Mordano, IEEE, New York, 1999, p. 192.
-
-
-
-
31
-
-
0031676397
-
-
F.J. Thayer, J.C. Herzog, J.D. Guttman, Strand spaces: why is a security protocol correct, in: Proc. Symp. on Security and Privacy, Oakland, IEEE, New York, 1998, pp. 160-171.
-
-
-
|