-
2
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
3
-
-
84941182030
-
-
The Verisoft Project, http://www.verisoft.de/.
-
-
-
-
4
-
-
85189862740
-
Vertrauenswüdige chipkartenbasierte biometrische authentifikation
-
Jana Dittmann (Hrsg.), Sicherheit 2006, Sicherheit-Schutz und Zuverlässigkeit, Gesellschaft fr Informatik, Bonn
-
G. Lassmann, M. Schwan. Vertrauenswüdige Chipkartenbasierte Biometrische Authentifikation. In Jana Dittmann (Hrsg.), Sicherheit 2006, Sicherheit-Schutz und Zuverlässigkeit, GI-Edition Lectures Notes in Informatics, Gesellschaft fr Informatik, Bonn, 2006.
-
(2006)
GI-edition Lectures Notes in Informatics
-
-
Lassmann, G.1
Schwan, M.2
-
5
-
-
0003777431
-
-
Addison Wesley
-
P.Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. Modeling and Analysis of Security Protocols. Addison Wesley, 2000.
-
(2000)
Modeling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
6
-
-
0003902378
-
The CAPSL integrated protocol environment
-
protocol October
-
G. Denker and J. Millen and H. Rueß. The CAPSL Integrated Protocol Environment, protocol. SRI Technical Report SRI-CSL-2000-02, October 2000.
-
(2000)
SRI Technical Report
, vol.SRI-CSL-2000-02
-
-
Denker, G.1
Millen, J.2
Rueß, H.3
-
7
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2): 113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
8
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6:53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
9
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Software - Concepts and Tools, 17:93-102, 1996.
-
(1996)
Software - Concepts and Tools
, vol.17
, pp. 93-102
-
-
Lowe, G.1
-
11
-
-
84957639842
-
Towards an automatic analysis of security protocols, Towards an automatic analysis of security protocols
-
Proceedings of the 16th International Conference on Automated Deduction, Springer-Verlag
-
C. Weidenbach, Towards an automatic analysis of security protocols, Towards an automatic analysis of security protocols. In Proceedings of the 16th International Conference on Automated Deduction, pages 378-382. LNCS 1632, Springer-Verlag, 1999
-
(1999)
LNCS
, vol.1632
, pp. 378-382
-
-
Weidenbach, C.1
-
16
-
-
84961379291
-
Lazy infinite-state analysis of security protocols
-
Secure Networking - CQRE [Secure] '99, Springer-Verlag, Dsseldorf, Germany, November
-
David Basin, Lazy Infinite-State Analysis of Security Protocols, Secure Networking - CQRE [Secure] '99, Springer-Verlag, Lecture Notes in Computer Science, no. 1740, pp. 30-42, Dsseldorf, Germany, November, 1999
-
(1999)
Lecture Notes in Computer Science
, vol.1740
, pp. 30-42
-
-
Basin, D.1
-
18
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F. J. Thayer Fábrega, J. C. Herzog, and J. D. Guttman. Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2, 3):191-230, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Thayer Fábrega, F.J.1
Herzog, J.C.2
Guttman, J.D.3
-
20
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
LNCS 2071, Springer
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proceedings ICALP'01, LNCS 2071, pp. 667 - 681. Springer, 2001
-
(2001)
Proceedings ICALP'01
, pp. 667-681
-
-
Boreale, M.1
-
21
-
-
33750993138
-
-
Proceedings of the FLoC Workshop on Formal Methods and Security Protocols (Trento, Italy)
-
R. Donovan, M. Norris, and G. Lowe, Analyzing a library of security protocols using Casper and FDR, Proceedings of the FLoC Workshop on Formal Methods and Security Protocols (Trento, Italy), 1999.
-
(1999)
Analyzing a Library of Security Protocols Using Casper and FDR
-
-
Donovan, R.1
Norris, M.2
Lowe, G.3
-
22
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. X. Song, S. Berezin, and A. Perrig. Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1, 2):47-74, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.X.1
Berezin, S.2
Perrig, A.3
-
23
-
-
0442300013
-
Deduction in the verification support environment (vse)
-
Marie-Claude Gaudel and James Woodcock, editors. SPRINGER
-
Dieter Hutter, Bruno Langenstein, Claus Sengler, Jörg H. Siekmann, Werner Stephan, and Andreas Wolpers. Deduction in the Verification Support Environment (VSE). In Marie-Claude Gaudel and James Woodcock, editors, Proceedings Formal Methods Europe 1996: Industrial Benefits and Advances in Formal Methods. SPRINGER, 1996.
-
(1996)
Proceedings Formal Methods Europe 1996: Industrial Benefits and Advances in Formal Methods
-
-
Hutter, D.1
Langenstein, B.2
Sengler, C.3
Siekmann, J.H.4
Stephan, W.5
Wolpers, A.6
-
24
-
-
0030413283
-
Verification support environment (vse)
-
Dieter Hutter, Bruno Langenstein, Claus Sengler, Jörg H. Siekmann, Werner Stephan, and Andreas Wolpers. Verification support environment (vse). High Integrity Systems, 1(6): 523-530, 1996.
-
(1996)
High Integrity Systems
, vol.1
, Issue.6
, pp. 523-530
-
-
Hutter, D.1
Langenstein, B.2
Sengler, C.3
Siekmann, J.H.4
Stephan, W.5
Wolpers, A.6
-
25
-
-
59749099944
-
VSE: Controlling the complexity in formal software developments
-
D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Boppard, Germany. Springer-Verlag, LNCS 1641
-
Dieter Hutter, Heiko Mantel, Georg Rock, Werner Stephan, Andreas Wolpers, Michael Balser, Wolfgang Reif, Gerhard Schellhorn, and Kurt Stenzel. VSE: Controlling the complexity in formal software developments. In D. Hutter, W. Stephan, P. Traverso, and M. Ullmann, editors, Proceedings Current Trends in Applied Formal Methods, FM-Trends 98, Boppard, Germany, 1999. Springer-Verlag, LNCS 1641.
-
(1999)
Proceedings Current Trends in Applied Formal Methods, FM-trends 98
-
-
Hutter, D.1
Mantel, H.2
Rock, G.3
Stephan, W.4
Wolpers, A.5
Balser, M.6
Reif, W.7
Schellhorn, G.8
Stenzel, K.9
-
26
-
-
1842782181
-
Formal software development in the verification support environment (vse)
-
Bill Manaris Jim Etheredge, editor. AAAI-Press
-
Dieter Hutter, Georg Rock, Jörg H. Siekmann, Werner Stephan, and Roland Vogt. Formal Software Development in the Verification Support Environment (VSE). In Bill Manaris Jim Etheredge, editor, FLAIRS-2000: Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference, pages 367-376. AAAI-Press, 2000.
-
(2000)
FLAIRS-2000: Proceedings of the Thirteenth International Florida Artificial Intelligence Research Society Conference
, pp. 367-376
-
-
Hutter, D.1
Rock, G.2
Siekmann, J.H.3
Stephan, W.4
Vogt, R.5
-
27
-
-
0442315610
-
Modular reasoning about structured TLA specifications
-
R. Berghammer and Y. Lakhnech, editors, Advances in Computing Science. Springer, WienNewYork
-
Georg Rock, Werner Stephan, and Andreas Wolpers. Modular Reasoning about Structured TLA Specifications. In R. Berghammer and Y. Lakhnech, editors, Tool Support for System Specification, Development and Verification, Advances in Computing Science, pages 217-229. Springer, WienNewYork, 1999.
-
(1999)
Tool Support for System Specification, Development and Verification
, pp. 217-229
-
-
Rock, G.1
Stephan, W.2
Wolpers, A.3
-
28
-
-
33751009888
-
Assumption-commitment specifications and safety-critical systems
-
Hartmut Knig and Peter Langendrfer, editors. Shaker Verlag, Aachen, 8. GI/ITG-Fachgespräch
-
Georg Rock, Werner Stephan, and Andreas Wolpers. Assumption-Commitment Specifications and Safety-Critical Systems. In Hartmut Knig and Peter Langendrfer, editors, FBT'98. Formale Beschreibungstechniken für verteilte Systeme, pages 125-135. Shaker Verlag, Aachen, 1998. 8. GI/ITG- Fachgespräch.
-
(1998)
FBT'98. Formale Beschreibungstechniken für Verteilte Systeme
, pp. 125-135
-
-
Rock, G.1
Stephan, W.2
Wolpers, A.3
-
29
-
-
33751005804
-
Verification support environment
-
Dieter Hutter and Werner Stephan, editors, Mechanizing Mathematical Reasoning, Essays in Honor of Jörg H. Siekmann on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, Springer Verlag January, ISBN 3540250514
-
Werner Stephan, Bruno Langenstein, Andreas Nonnengart, and Georg Rock. Verification Support Environment. In Dieter Hutter and Werner Stephan, editors, Mechanizing Mathematical Reasoning, Essays in Honor of Jörg H. Siekmann on the Occasion of His 60th Birthday, Lecture Notes in Computer Science, LNAI2605, pages 476 - 493, Springer Verlag January 2005, ISBN 3540250514
-
(2005)
LNAI
, vol.2605
, pp. 476-493
-
-
Stephan, W.1
Langenstein, B.2
Nonnengart, A.3
Rock, G.4
|