-
1
-
-
0032623470
-
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
-
May
-
Stefanos Gritzalis, Diomidis Spinellis, and Panagiotis Georgiadis. Security protocols over open networks and distributed systems: Formal methods for their analysis,design, and verification. Computer Communications, 22(8):695-707,May 1999
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 695-707
-
-
Gritzalis, S.1
Spinellis, D.2
Georgiadis, P.3
-
2
-
-
0025386404
-
A logic of authentication
-
Burrows M., Abadi M., Needham R., A Logic of Authentication, ACM Transactionson Computer Systems, 8(1), (1990) 18-36.
-
(1990)
ACM Transactionson Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
33744984154
-
Hermes,a tool verifying secrecy properties of unbounded security protocols
-
Lecture Notes in Computer Science, Springer Verlag, July
-
Liana Bozga, Yassine Lakhnech and Michael Périn. Hermes,a tool verifying secrecy properties of unbounded security protocols. In 15th international conference on Computer-Aided Verification (CAV'03), Lecture Notes in Computer Science, Springer Verlag, July 2003.
-
(2003)
15th International Conference on Computer-aided Verification (CAV'03)
-
-
Bozga, L.1
Lakhnech, Y.2
Périn, M.3
-
5
-
-
20344364980
-
-
Technical Report EVA-6-vl, Verimag, Grenoble, France, May
-
L. Bozga, Y. Lakhnech, and M Périn. L'outil de vérification HERMES. Technical Report EVA-6-vl, Verimag, Grenoble, France, May 2002. Available from http:://www-eva.imag.fr
-
(2002)
L'Outil de Vérification HERMES
-
-
Bozga, L.1
Lakhnech, Y.2
Périn, M.3
-
9
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows C., The NRL Protocol Analyzer: An overview, Journal of Logic Programming, Vol. 26, No. 2, (1996) 113-131.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
10
-
-
0024665744
-
Analyzing encryption protocols using formal verification techniques
-
Kemmerer R., Analyzing encryption protocols using formal verification techniques, IEEE Journal on Selected Areas in Communications, 7(4), (1989) 448-457.
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.1
-
11
-
-
33750952493
-
-
http://www.avispa-project.org
-
-
-
-
13
-
-
84876354671
-
A method for automatic cryptographic protocol verification
-
International Workshop on Formal Methods for Parallel Programming, Theory and Applications
-
J. Goubault-Larrecq. A method for automatic cryptographic protocol verification. In International Workshop on Formal Methods for Parallel Programming, Theory and Applications. volume 1800 of LNCS, 2000.
-
(2000)
LNCS
, vol.1800
-
-
Goubault-Larrecq, J.1
-
14
-
-
24644519551
-
-
Technical report on EVA No 13, Véronique Cortier, December
-
Technical report on EVA No 13, A guide for SECURIFY, Véronique Cortier, December 2003. http://www-eva.imag.fr/bib/EVA-TR13.pdf
-
(2003)
A Guide for SECURIFY
-
-
-
15
-
-
0025386404
-
A logic o authentication
-
M. Burrows, M. Abadi, and R. Needham. A Logic o Authentication. ACM Transactions on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
16
-
-
33750936417
-
-
Sept. Status: Proposed Standard
-
P. Calhoun, J. Loughney, E. Guttman, G. Zorn, and J. Arkko. RFC 3588: Diameter Base Protocol, Sept. 2003. Status: Proposed Standard.
-
(2003)
RFC 3588: Diameter Base Protocol
-
-
Calhoun, P.1
Loughney, J.2
Guttman, E.3
Zorn, G.4
Arkko, J.5
|