-
2
-
-
30144438857
-
The AVISPA tool
-
LNCS 3576
-
A. Armando, D. Basin, Y. B. Y. Chevalier, L. Compagna, L. Cuellar, P. Drielsma, P. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA tool. In Proc. of CAV'2005, LNCS 3576. 2005.
-
(2005)
Proc. of CAV'2005
-
-
Armando, A.1
Basin, D.2
Chevalier, Y.B.Y.3
Compagna, L.4
Cuellar, L.5
Drielsma, P.6
Heám, P.7
Kouchnarenko, O.8
Mantovani, J.9
Mödersheim, S.10
Von Oheimb, D.11
Rusinowitch, M.12
Santiago, J.13
Turuani, M.14
Viganò, L.15
Vigneron, L.16
-
3
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Cape Breton, June. IEEE Computer Society
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, June 2001. IEEE Computer Society.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 82-96
-
-
Blanchet, B.1
-
4
-
-
33645603568
-
Protocols for authentication and key establishment
-
Springer. ISBN: 3-540-43107-1
-
C. Boyd and A. Mathuria. Protocols for Authentication and Key Establishment. Information Security and Cryptography. Springer, 2003. ISBN: 3-540-43107-1.
-
(2003)
Information Security and Cryptography
-
-
Boyd, C.1
Mathuria, A.2
-
5
-
-
28144462281
-
Universally composable security: A new paradigm for cryptographic protocols
-
Report 2000/067
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. Cryptology ePrint Archive, Report 2000/067.
-
Cryptology EPrint Archive
-
-
Canetti, R.1
-
10
-
-
24944514681
-
Operational semantics of security protocols
-
S. Leue and T. Systä, editors, Scenarios: Models, Transformations and Tools Workshop 2003, Revised Selected Papers. Springer
-
C. Cremers and S. Mauw. Operational semantics of security protocols. In S. Leue and T. Systä, editors, Scenarios: Models, Transformations and Tools Workshop 2003, Revised Selected Papers, volume 3466 of LNCS. Springer, 2005.
-
(2005)
LNCS
, vol.3466
-
-
Cremers, C.1
Mauw, S.2
-
11
-
-
33750960535
-
Defining authentication in a trace model
-
T. Dimitrakos and F. Martinelli, editors, FAST 2003, Pisa, September
-
C. Cremers, S. Mauw, and E. de Vink. Defining authentication in a trace model. In T. Dimitrakos and F. Martinelli, editors, FAST 2003, pages 131-145, Pisa, September 2003. IITT-CNR technical report.
-
(2003)
IITT-CNR Technical Report
, pp. 131-145
-
-
Cremers, C.1
Mauw, S.2
De Vink, E.3
-
12
-
-
2642548302
-
Secure protocol composition
-
Proc. of Mathematical Foundations of Programming Semantics
-
A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. Secure protocol composition. In Proc. of Mathematical Foundations of Programming Semantics, volume 83 of ENTCS, 2003.
-
(2003)
ENTCS
, vol.83
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
16
-
-
0037268614
-
How to prevent type flaw attacks on security protocols
-
J. Heather, G. Lowe, and S. Schneider. How to prevent type flaw attacks on security protocols. Journal of Computer Security, 11(2):217-244, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 217-244
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
19
-
-
12744277366
-
On preventing type flaw attacks on security protocols with a simplified tagging scheme
-
Y. Li, W. Yang, and C.-W. Huang. On preventing type flaw attacks on security protocols with a simplified tagging scheme. J. Inf. Sci. Eng., 21(1):59-84, 2005.
-
(2005)
J. Inf. Sci. Eng.
, vol.21
, Issue.1
, pp. 59-84
-
-
Li, Y.1
Yang, W.2
Huang, C.-W.3
-
20
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Springer Verlag
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS, volume 1055, pages 147-166. Springer Verlag, 1996.
-
(1996)
Proceedings of TACAS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
21
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
IEEE
-
G. Lowe. Casper: A compiler for the analysis of security protocols. In Proc. CSFW '97, Rockport. IEEE, 1997.
-
(1997)
Proc. CSFW '97, Rockport
-
-
Lowe, G.1
-
23
-
-
33750963837
-
Tags for multi-protocol authentication
-
Electronic Notes in Theoretical Computer Science, August. To appear
-
M. Maffei. Tags for multi-protocol authentication. In Proc. SECCO 2004, Electronic Notes in Theoretical Computer Science, August 2004. To appear.
-
(2004)
Proc. SECCO 2004
-
-
Maffei, M.1
-
24
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. Song, S. Berezin, and A. Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1/2):47-74, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
25
-
-
33750937443
-
-
Security protocols open repository (SPORE)
-
Security protocols open repository (SPORE).
-
-
-
-
27
-
-
0033605501
-
Inter-protocol interleaving attacks on some authentication and key distribution protocols
-
W. Tzeng and C. Hu. Inter-protocol interleaving attacks on some authentication and key distribution protocols. Inf. Process. Lett., 69(6):297-302, 1999.
-
(1999)
Inf. Process. Lett.
, vol.69
, Issue.6
, pp. 297-302
-
-
Tzeng, W.1
Hu, C.2
-
28
-
-
0002508587
-
A lesson on authentication protocol design
-
T. Woo and S. Lam. A lesson on authentication protocol design. SIGOPS Oper. Syst. Rev., 28(3):24-37, 1994.
-
(1994)
SIGOPS Oper. Syst. Rev.
, vol.28
, Issue.3
, pp. 24-37
-
-
Woo, T.1
Lam, S.2
|