-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
5
-
-
33646080360
-
Security-typed languages for implementation of cryptographic protocols: A case study
-
10th European Symposium on Research in Computer Security ESORICS'05, of, Springer
-
A. Askarov and A. Sabelfeld. Security-typed languages for implementation of cryptographic protocols: A case study. In 10th European Symposium on Research in Computer Security (ESORICS'05), volume 3679 of LNCS, pages 197-221. Springer, 2005.
-
(2005)
LNCS
, vol.3679
, pp. 197-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
7
-
-
33749385337
-
Secure sessions for web services
-
Oct
-
K. Bhargavan, R. Corin, C. Fournet, and A. D. Gordon. Secure sessions for web services. In 2004 ACM Workshop on Secure Web Services (SWS), pages 11-22, Oct. 2004.
-
(2004)
2004 ACM Workshop on Secure Web Services (SWS)
, pp. 11-22
-
-
Bhargavan, K.1
Corin, R.2
Fournet, C.3
Gordon, A.D.4
-
9
-
-
18544363572
-
A semantics for web services authentication
-
June
-
K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. Theoretical Comput. Sci., 340(1):102-153, June 2005.
-
(2005)
Theoretical Comput. Sci
, vol.340
, Issue.1
, pp. 102-153
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
10
-
-
35048821943
-
TulaFale: A security tool for web services
-
International Symposium on Formal Methods for Components and Objects FMCO'03, of, Springer
-
K. Bhargavan, C. Fournet, A. D. Gordon, and R. Pucella. TulaFale: A security tool for web services. In International Symposium on Formal Methods for Components and Objects (FMCO'03), volume 3188 of LNCS, pages 197-222. Springer, 2004.
-
(2004)
LNCS
, vol.3188
, pp. 197-222
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Pucella, R.4
-
11
-
-
33947663592
-
Verified interoperable implementations of security protocols
-
Technical Report MSR-TR-2006-46, Microsoft Research
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. Technical Report MSR-TR-2006-46, Microsoft Research, 2006.
-
(2006)
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
14
-
-
13644264990
-
Verification of cryptographic protocols: Tagging enforces termination
-
B. Blanchet and A. Podelski. Verification of cryptographic protocols: Tagging enforces termination. Theoretical Computer Science, 333(1-2):67-90, 2005.
-
(2005)
Theoretical Computer Science
, vol.333
, Issue.1-2
, pp. 67-90
-
-
Blanchet, B.1
Podelski, A.2
-
17
-
-
33947616793
-
-
D. Eastlake, J. Reagle, et al. XML Encryption Syntax and Processing, 2002. W3C Recommendation.
-
D. Eastlake, J. Reagle, et al. XML Encryption Syntax and Processing, 2002. W3C Recommendation.
-
-
-
-
18
-
-
33947684372
-
-
D. Eastlake, J. Reagle, D. Solo, et al. XML-Signature Syntax and Processing, 2002. W3C Recommendation.
-
D. Eastlake, J. Reagle, D. Solo, et al. XML-Signature Syntax and Processing, 2002. W3C Recommendation.
-
-
-
-
19
-
-
33947702621
-
-
Galois Connections. Cryptol Reference Manual, 2005.
-
Galois Connections. Cryptol Reference Manual, 2005.
-
-
-
-
20
-
-
1442286773
-
On the secure implementation of security protocols
-
P. Giambiagi and M. Dam. On the secure implementation of security protocols. Science of Computer Programming, 50:73-99, 2004.
-
(2004)
Science of Computer Programming
, vol.50
, pp. 73-99
-
-
Giambiagi, P.1
Dam, M.2
-
22
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
6th International. Conference on Verification, Model Checking and Abstract Interpretation VMCAI'05, of, Springer
-
J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In 6th International. Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of LNCS, pages 363-379. Springer, 2005.
-
(2005)
LNCS
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
23
-
-
33947671911
-
-
M. Gudgin et al. SOAP Version 1.2, 2003. W3C Recommendation
-
M. Gudgin et al. SOAP Version 1.2, 2003. W3C Recommendation.
-
-
-
-
24
-
-
33646176467
-
Programming cryptographic protocols
-
Trusted Global Computing TGC'05, of, Springer
-
J. D. Guttman, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen. Programming cryptographic protocols. In Trusted Global Computing (TGC'05), volume 3705 of LNCS, pages 116-145. Springer, 2005.
-
(2005)
LNCS
, vol.3705
, pp. 116-145
-
-
Guttman, J.D.1
Herzog, J.C.2
Ramsdell, J.D.3
Sniffen, B.T.4
-
28
-
-
33947683344
-
-
Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http://msdn.microsoft.com/webservices/building/wse/default.aspx.
-
Microsoft Corporation. Web Services Enhancements (WSE) 2.0, 2004. At http://msdn.microsoft.com/webservices/building/wse/default.aspx.
-
-
-
-
31
-
-
3042673595
-
Cryptographic protocol generation from CAPSL
-
Technical Report SRI-CSL-01-07, SRI, 2001
-
F. Muller and J. Millen. Cryptographic protocol generation from CAPSL. Technical Report SRI-CSL-01-07, SRI, 2001.
-
-
-
Muller, F.1
Millen, J.2
-
33
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
34
-
-
0023247970
-
Efficient and timely mutual authentication
-
D. Otway and O. Rees. Efficient and timely mutual authentication. Operation Systems Review, 21(1):8-10, 1987.
-
(1987)
Operation Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
35
-
-
84958777572
-
AGVI - automatic generation, verification, and implementation of security protocols
-
13th Conference on Computer Aided Verification CAV, Springer
-
A. Perrig, D. Song, and D. Phan. AGVI - automatic generation, verification, and implementation of security protocols. In 13th Conference on Computer Aided Verification (CAV), LNCS, pages 241-245. Springer, 2001.
-
(2001)
LNCS
, pp. 241-245
-
-
Perrig, A.1
Song, D.2
Phan, D.3
-
36
-
-
3042621964
-
Spi2Java: Automatic cryptographic protocol Java code generation from spi calculus
-
D. Pozza, R. Sisto, and L. Durante. Spi2Java: automatic cryptographic protocol Java code generation from spi calculus. In 18th International Conference on Advanced Information Networking and Applications (AINA 2004), volume 1, pages 400-405, 2004.
-
(2004)
18th International Conference on Advanced Information Networking and Applications (AINA 2004)
, vol.1
, pp. 400-405
-
-
Pozza, D.1
Sisto, R.2
Durante, L.3
-
39
-
-
33947670490
-
-
D. Syme. F#, 2005. At http://research, microsoft.com/projects/ilx/fsharp. aspx.
-
D. Syme. F#, 2005. At http://research, microsoft.com/projects/ilx/fsharp. aspx.
-
-
-
|