-
1
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Foundations of Software Science and Computation Structures. Gordon A.D. (Ed), Springer
-
Blanchet B., and Podelski A. Verification of cryptographic protocols: Tagging enforces termination. In: Gordon A.D. (Ed). Foundations of Software Science and Computation Structures. LNCS number 2620 (April 2003), Springer 136-152
-
(2003)
LNCS
, vol.number 2620
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
2
-
-
35048899619
-
Searching for shapes in cryptographic protocols
-
Tools and Algorithms for Construction and Analysis of Systems (TACAS), Springer Extended version at URL
-
Doghmi S.F., Guttman J.D., and Javier Thayer F. Searching for shapes in cryptographic protocols. Tools and Algorithms for Construction and Analysis of Systems (TACAS). LNCS (March 2007), Springer. http://eprint.iacr.org/2006/435 Extended version at URL
-
(2007)
LNCS
-
-
Doghmi, S.F.1
Guttman, J.D.2
Javier Thayer, F.3
-
3
-
-
18444377006
-
Security goals: Packet trajectories and strand spaces
-
Foundations of Security Analysis and Design. Gorrieri R., and Focardi R. (Eds), Springer Verlag
-
Guttman J.D. Security goals: Packet trajectories and strand spaces. In: Gorrieri R., and Focardi R. (Eds). Foundations of Security Analysis and Design. LNCS volume 2171 (2001), Springer Verlag 197-261
-
(2001)
LNCS
, vol.2171
, pp. 197-261
-
-
Guttman, J.D.1
-
4
-
-
0037076868
-
Authentication tests and the structure of bundles
-
Guttman J.D., and Javier Thayer F. Authentication tests and the structure of bundles. Theoretical Computer Science 283 2 (June 2002) 333-380
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Javier Thayer, F.2
-
5
-
-
27844571925
-
The faithfulness of abstract protocol analysis: Message authentication
-
Guttman J.D., Javier Thayer F., and Zuck L.D. The faithfulness of abstract protocol analysis: Message authentication. Journal of Computer Security 12 6 (2004) 865-891
-
(2004)
Journal of Computer Security
, vol.12
, Issue.6
, pp. 865-891
-
-
Guttman, J.D.1
Javier Thayer, F.2
Zuck, L.D.3
-
6
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proceeedings of tacas, Springer Verlag
-
Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Proceeedings of tacas. Lecture Notes in Computer Science volume 1055 (1996), Springer Verlag 147-166
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
7
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM 21 12 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
-
-
Needham, R.1
Schroeder, M.2
-
8
-
-
33847640933
-
-
R. Ramanujam and S.P. Suresh. A decidable subclass of unbounded security protocol. In R. Gorrieri, editor, WITS '03: Workshop on Issues in the Theory of Security, pages 11-20, Warsaw, April 2003
-
-
-
|