-
1
-
-
0035035153
-
-
Abadi, M. and C. Fournet, Mobile values, new names, and secure communication, in: 28th ACM Symposium on Principles of Programming Languages, 2001, pp. 104-115
-
-
-
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: the spi calculus
-
expanded version available as SRC Research Report 149 (January 1998)
-
Abadi M., and Gordon A. A calculus for cryptographic protocols: the spi calculus. Information and Computation 148 (1999) 1-70 expanded version available as SRC Research Report 149 (January 1998)
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
3
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Computer Aided Verification, Proceedings. 17th International Conference, CAV 2005
-
Armando A., Basin D.A., Boichut Y., Chevalier Y., Compagna L., Cuéllar J., Drielsma P.H., Héam P.-C., Kouchnarenko O., Mantovani J., Mödersheim S., von Oheimb D., Rusinowitch M., Santiago J., Turuani M., Viganò L., and Vigneron L. The AVISPA tool for the automated validation of internet security protocols and applications. Computer Aided Verification, Proceedings. 17th International Conference, CAV 2005. Lecture Notes in Computer Science 3576 (2005) 281-285
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.A.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuéllar, J.6
Drielsma, P.H.7
Héam, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
5
-
-
28144440505
-
-
Backes, M., A. Datta, A. Derek, J.C. Mitchell and M. Turuani, Compositional analysis of contract signing protocols, in: Proceedings of 18th IEEE Computer Security Foundations Workshop (2005)
-
-
-
-
6
-
-
33847642541
-
-
Beauxis, R. and C. Palamidessi, On the asynchronous nature of the asynchronous π-calculus (2006), manuscript
-
-
-
-
7
-
-
22444455879
-
-
Bella, G. and L.C. Paulson, Kerberos version IV: Inductive analysis of the secrecy goals, in: J.-J. Quisquater, editor, Proceedings of the 5th European Symposium on Research in Computer Security (1998), pp. 361-375
-
-
-
-
8
-
-
84945119254
-
-
Bellare, M. and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryprtology - Crypto '93 Proceedings, pp. 232-249
-
-
-
-
10
-
-
0034822279
-
-
Blanchet, B., An Efficient Cryptographic Protocol Verifier Based on Prolog Rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW-14) (2001), pp. 82-96
-
-
-
-
11
-
-
85177219949
-
-
Borisov, N., I. Goldberg and D. Wagner, Intercepting mobile communications: the insecurity of 802.11, in: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, 2001, pp. 180-189.
-
-
-
-
14
-
-
33847657941
-
-
Butler, F., I. Cervesato, A. Jaggard, A. Scedrov and C. Walstad, Formal analysis of Kerberos 5 (2006), Theoretical Computer Science, in press
-
-
-
-
15
-
-
35048902360
-
Verifying confidentiality and authentication in kerberos 5
-
Software Security - Theories and Systems. Second Mext-NSF-JSPS International Symposium, ISSS 2003
-
Butler F., Cervesato I., Jaggard A.D., and Scedrov A. Verifying confidentiality and authentication in kerberos 5. Software Security - Theories and Systems. Second Mext-NSF-JSPS International Symposium, ISSS 2003. Lecture Notes in Computer Science 3233 (2003) 1-24
-
(2003)
Lecture Notes in Computer Science
, vol.3233
, pp. 1-24
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
-
17
-
-
2642523732
-
Environmental requirements for authentication protocols
-
Proceedings of Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS
-
Canetti R., Meadows C., and Syverson P. Environmental requirements for authentication protocols. Proceedings of Software Security - Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS. LNCS vol. 2609 (2003) 339-355
-
(2003)
LNCS
, vol.2609
, pp. 339-355
-
-
Canetti, R.1
Meadows, C.2
Syverson, P.3
-
18
-
-
33847685835
-
-
Cervesato, I., A. Jaggard, A. Scedrov, J.-K. Tsay and C. Walstad, Breaking and fixing public-key kerberos, Technical report. URL ftp://ftp.cis.upenn.edu/pub/papers/scedrov/pkinit.pdf
-
-
-
-
19
-
-
33847610010
-
-
Cervesato, I., A. Jaggard, A. Scedrov, J.-K. Tsay and C. Walstad, Breaking and fixing public-key Kerberos, in: Proc. 11-th Asian Computing Science Conference (ASIAN'06), Springer LNCS, to appear, 2006, preliminary report on http://eprint.iacr.org/2006/009
-
-
-
-
20
-
-
34548864135
-
-
Datta, A., A. Derek, J.C. Mitchell and D. Pavlovic, A derivation system for security protocols and its logical formalization, in: Proceedings of 16th IEEE Computer Security Foundations Workshop (2003), pp. 109-125
-
-
-
-
21
-
-
2642548302
-
-
Datta, A., A. Derek, J.C. Mitchell and D. Pavlovic, Secure protocol composition (extended abstract), in: Proceedings of ACM Workshop on Formal Methods in Security Engineering, 2003, pp. 11-23
-
-
-
-
22
-
-
4944226639
-
-
Datta, A., A. Derek, J.C. Mitchell and D. Pavlovic, Abstraction and refinement in protocol derivation, in: Proceedings of 17th IEEE Computer Security Foundations Workshop (2004), pp. 30-45
-
-
-
-
23
-
-
33847664642
-
-
Datta, A., A. Derek, J.C. Mitchell and D. Pavlovic, Secure protocol composition, in: Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics (2004)
-
-
-
-
25
-
-
26444565771
-
Probabilistic polynomial-time semantics for a protocol security logic
-
Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP '05)
-
Datta A., Derek A., Mitchell J.C., Shmatikov V., and Turuani M. Probabilistic polynomial-time semantics for a protocol security logic. Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP '05). Lecture Notes in Computer Science (2005) 16-29
-
(2005)
Lecture Notes in Computer Science
, pp. 16-29
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Shmatikov, V.4
Turuani, M.5
-
26
-
-
33947704230
-
-
Datta, A., A. Derek, J.C. Mitchell and B. Warinschi, Computationally sound compositional logic for key exchange protocols, in: Proceedings of 19th IEEE Computer Security Foundations Workshop (2006), pp. 321-334
-
-
-
-
29
-
-
0034834930
-
-
Durgin, N., J.C. Mitchell and D. Pavlovic, A compositional logic for protocol correctness, in: Proceedings of 14th IEEE Computer Security Foundations Workshop (2001), pp. 241-255
-
-
-
-
30
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
Durgin N., Mitchell J.C., and Pavlovic D. A compositional logic for proving security properties of protocols. Journal of Computer Security 11 (2003) 677-721
-
(2003)
Journal of Computer Security
, vol.11
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
34
-
-
0033714403
-
-
Guttman, J.D. and F.J.T. Fábrega, Protocol independence through disjoint encryption, in: Proceedings of 13th IEEE Computer Security Foundations Workshop (2000), pp. 24-34
-
-
-
-
36
-
-
33847651277
-
-
Harkins, D. and D. Carrel, The Internet Key Exchange (IKE) (1998), rFC 2409
-
-
-
-
38
-
-
33745770376
-
-
He, C., M. Sundararajan, A. Datta, A. Derek and J.C. Mitchell, A modular correctness proof of IEEE 802.11i and TLS, in: CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, 2005, pp. 2-15
-
-
-
-
40
-
-
84945708698
-
An axiomatic basis for computer programming
-
Hoare C.A.R. An axiomatic basis for computer programming. Communications of the ACM 12 (1969) 576-580
-
(1969)
Communications of the ACM
, vol.12
, pp. 576-580
-
-
Hoare, C.A.R.1
-
41
-
-
0018005391
-
Communicating sequential processes
-
Hoare C.A.R. Communicating sequential processes. Commun. ACM 21 (1978) 666-677
-
(1978)
Commun. ACM
, vol.21
, pp. 666-677
-
-
Hoare, C.A.R.1
-
42
-
-
33847678955
-
-
Kelsey, J., B. Schneier and D. Wagner, Protocol interactions and the chosen protocol attack, in: Proceedings of the International Workshop on Security Protocols, 1997
-
-
-
-
43
-
-
33847660020
-
-
Kohl, J. and B. Neuman, The Kerberos network authentication service (version 5), IETF RFC 1510 (1993)
-
-
-
-
44
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security protocols
-
Formal Methods World Congress, vol. I
-
Lincoln P.D., Mitchell J.C., Mitchell M., and Scedrov A. Probabilistic polynomial-time equivalence and security protocols. Formal Methods World Congress, vol. I. Lecture Notes in Computer Science 1708 (1999) 776-793
-
(1999)
Lecture Notes in Computer Science
, vol.1708
, pp. 776-793
-
-
Lincoln, P.D.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
45
-
-
0029719080
-
-
Lowe, G., Some new attacks upon security protocols, in: Proceedings of 9th IEEE Computer Security Foundations Workshop (1996), pp. 162-169
-
-
-
-
46
-
-
0032684740
-
-
Lynch, N., I/O automata models and proofs for shared-key communication systems, in: Proceedings of 12th IEEE Computer Security Foundations Workshop (1999), pp. 14-29
-
-
-
-
48
-
-
84948418498
-
-
Mantel, H., On the Composition of Secure Systems, in: Proceedings of the IEEE Symposium on Security and Privacy (2002), pp. 88-101
-
-
-
-
49
-
-
0023829319
-
-
McCullough, D., Noninterference and the composability of security properties, in: Proceedings of the IEEE Symposium on Security and Privacy (1988), pp. 177-186
-
-
-
-
51
-
-
0025139568
-
-
McLean, J., Security models and information flow, in: Proceedings of the IEEE Symposium on Security and Privacy (1990)
-
-
-
-
52
-
-
0002426876
-
A general theory of composition for a class of "possibilistic" properties
-
McLean J. A general theory of composition for a class of "possibilistic" properties. IEEE Transactions on Software Engineering 22 (1996) 53-67
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, pp. 53-67
-
-
McLean, J.1
-
53
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows C. The NRL protocol analyzer: An overview. Journal of Logic Programming 26 (1996) 113-131
-
(1996)
Journal of Logic Programming
, vol.26
, pp. 113-131
-
-
Meadows, C.1
-
54
-
-
33847690659
-
-
Meadows, C., Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer, in: Proceedings of the IEEE Symposium on Security and Privacy (1998)
-
-
-
-
55
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
Meadows C. Open issues in formal methods for cryptographic protocol analysis. Proceedings of DISCEX 2000 (2000) 237-250
-
(2000)
Proceedings of DISCEX 2000
, pp. 237-250
-
-
Meadows, C.1
-
56
-
-
33745772467
-
Deriving, attacking and defending the GDOI protocol
-
Computer Security - ESORICS 2004, Proceedings. 9th European Symposium on Research Computer Security
-
Meadows C., and Pavlovic D. Deriving, attacking and defending the GDOI protocol. Computer Security - ESORICS 2004, Proceedings. 9th European Symposium on Research Computer Security. Lecture Notes in Computer Science 3193 (2004) 53-72
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 53-72
-
-
Meadows, C.1
Pavlovic, D.2
-
59
-
-
0030705405
-
-
Mitchell, J., M. Mitchell and U. Stern, Automated analysis of cryptographic protocols using Murφ{symbol}, in: Proc. IEEE Symp. Security and Privacy, 1997, pp. 141-151
-
-
-
-
60
-
-
85084160482
-
-
Mitchell, J.C., V. Shmatikov and U. Stern, Finite-state analysis of ssl 3.0, in: Proceedings of the Seventh USENIX Security Symposium, 1998, pp. 201-216
-
-
-
-
61
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM 21 (1978) 993-999
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
63
-
-
0030696539
-
-
Paulson, L., Mechanized proofs for a recursive authentication protocol, in: Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997, pp. 84-95
-
-
-
-
64
-
-
0030705795
-
-
Paulson, L., Proving properties of security protocols by induction, in: Proceedings of 10th IEEE Computer Security Foundations Workshop, 1997, pp. 70-83
-
-
-
-
65
-
-
35048876713
-
Probabilistic bisimulation and equivalence for security analysis of network protocols
-
Foundations of Software Science and Computation Structures, Proceedings. 7th International Conference, FOSSACS 2004
-
Ramanathan A., Mitchell J.C., Scedrov A., and Teague V. Probabilistic bisimulation and equivalence for security analysis of network protocols. Foundations of Software Science and Computation Structures, Proceedings. 7th International Conference, FOSSACS 2004. Lecture Notes in Computer Science 2987 (2004) 468-483
-
(2004)
Lecture Notes in Computer Science
, vol.2987
, pp. 468-483
-
-
Ramanathan, A.1
Mitchell, J.C.2
Scedrov, A.3
Teague, V.4
-
66
-
-
0029484376
-
-
Roscoe, A.W., Modelling and verifying key-exchange protocols using CSP and FDR, in: 8th IEEE Computer Security Foundations Workshop (1995), pp. 98-107
-
-
-
-
67
-
-
33847633426
-
-
Roy, A., A. Datta, A. Derek and J.C. Mitchell, Inductive proof method for computational secrecy (2006), manuscript
-
-
-
-
68
-
-
33847624548
-
-
Roy, A., A. Datta, A. Derek, J.C. Mitchell and J.-P. Seifert, Secrecy analysis in protocol composition logic. (2006), to appear in Proceedings of 11th Annual Asian Computing Science Conference, December 2006
-
-
-
-
69
-
-
0003777431
-
-
Addison-Wesley
-
Ryan P., Schneider S., Goldsmith M., Lowe G., and Roscoe B. Modelling and Analysis of Security Protocols (2001), Addison-Wesley
-
(2001)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
70
-
-
0029721645
-
-
Schneider, S., Security properties and CSP, in: IEEE Symp. Security and Privacy, 1996
-
-
-
-
72
-
-
0032678887
-
-
Song, D., Athena: a new efficient automatic checker for security protocol analysis, in: Proceedings of 12th IEEE Computer Security Foundations Workshop (1999), pp. 192-202
-
-
-
-
73
-
-
0027929693
-
-
Syverson, P. and P. van Oorschot, On unifying some cryptographic protocol logics, in: Proceedings of 7th IEEE Computer Security Foundations Workshop, 1994, pp. 14-29
-
-
-
-
74
-
-
0032671776
-
-
Thayer, F.J., J.C. Herzog and J.D. Guttman, Mixed strand spaces, in: Proceedings of 12th IEEE Computer Security Foundations Workshop (1999), pp. 72-82
-
-
-
-
75
-
-
33847644945
-
-
Internet Resource. URL
-
"Verified by Visa" security program. Internet Resource. URL. https://usa.visa.com/personal/security/vbv/
-
"Verified by Visa" security program
-
-
-
76
-
-
84946432389
-
-
Wagner, D. and B. Schneier, Analysis of the ssl 3.0 protocol, in: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, 1996
-
-
-
-
77
-
-
0027205880
-
-
Woo, T.Y.C. and S.C. Lam, A semantic model for authentication protocols, in: Proceedings IEEE Symposium on Research in Security and Privacy, 1993
-
-
-
|