-
1
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. J. ACM 52(1), 102-146 (2005)
-
(2005)
J. ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi, M., Gordon, A.: A calculus for cryptographic protocols: The spi calculus. Inf. Comput. 148(1), 1-70 (1999)
-
(1999)
Inf. Comput
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
3
-
-
34047251867
-
-
Barendregt, H.P.: Lambda-calculi with types. In: Abramsky, S., Gabbay, D.M., Maibaum, T.S.E. (eds.) Background: Computational Structures, 2 Handbook of Logic in Computer Science. Claredon Press, Oxford (1992)
-
Barendregt, H.P.: Lambda-calculi with types. In: Abramsky, S., Gabbay, D.M., Maibaum, T.S.E. (eds.) Background: Computational Structures, vol. 2 Handbook of Logic in Computer Science. Claredon Press, Oxford (1992)
-
-
-
-
4
-
-
0027113388
-
The chemical abstract machine
-
Berry, G., Boudol, G.: The chemical abstract machine. Theor. Comp. Sci. 96( 1), 217-248 (1992)
-
(1992)
Theor. Comp. Sci
, vol.96
, Issue.1
, pp. 217-248
-
-
Berry, G.1
Boudol, G.2
-
5
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society
-
Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: 14th IEEE Computer Security Foundations Workshop, pp. 82-96. IEEE Computer Society (2001)
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
7
-
-
0002235894
-
Specification and proof in membership equational logic
-
Bouhoula, A., Jouannaud, J.-P., Meseguer, J.: Specification and proof in membership equational logic. Theor. Comp. Sci. 236, 35-132 (2000)
-
(2000)
Theor. Comp. Sci
, vol.236
, pp. 35-132
-
-
Bouhoula, A.1
Jouannaud, J.-P.2
Meseguer, J.3
-
9
-
-
84948759231
-
A formal analysis of some properties of kerberos 5 using MSR
-
IEEE Computer Society Press
-
Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: A formal analysis of some properties of kerberos 5 using MSR. In: Fifteenth Computer Security Foundations Workshop, pp. 175-190. IEEE Computer Society Press (2002)
-
(2002)
Fifteenth Computer Security Foundations Workshop
, pp. 175-190
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
-
10
-
-
3042580206
-
A specification language for crypto-protocols based on multiset rewriting, dependent types and subsorting
-
Analysis and Validation for Emerging Technologies, pp
-
Cervesato, I.: A specification language for crypto-protocols based on multiset rewriting, dependent types and subsorting. In: Workshop on Specification, Analysis and Validation for Emerging Technologies, pp. 1-22 (2001)
-
(2001)
Workshop on Specification
, pp. 1-22
-
-
Cervesato, I.1
-
11
-
-
84955619856
-
Typed MSR: Syntax and examples
-
1st International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, pp, Springer-Verlag
-
Cervesato, I.: Typed MSR: Syntax and examples. In: 1st International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, pp. 159-177. Springer-Verlag LNCS 2052 (2001)
-
(2001)
LNCS
, vol.2052
, pp. 159-177
-
-
Cervesato, I.1
-
12
-
-
35248898859
-
Data access specification and the most powerful symbolic attacker in MSR
-
Software Security, Theories and Systems, of, Springer-Verlag
-
Cervesato, I.: Data access specification and the most powerful symbolic attacker in MSR. In: Software Security, Theories and Systems, volume 2609 of Lecture Notes in Computer Science, pp. 384-416. Springer-Verlag (2003)
-
(2003)
Lecture Notes in Computer Science
, vol.2609
, pp. 384-416
-
-
Cervesato, I.1
-
13
-
-
34047272354
-
-
Cervesato, I.: MSR: Language definition and programming environment Nov. (2003). Draft available from http://theory.stanford.edu/~iliano/MSR/
-
Cervesato, I.: MSR: Language definition and programming environment Nov. (2003). Draft available from http://theory.stanford.edu/~iliano/MSR/
-
-
-
-
14
-
-
0033698744
-
Relating strands and multiset rewriting for security protocol analysis
-
IEEE Computer Society
-
Cervesato, I., Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Relating strands and multiset rewriting for security protocol analysis. In: 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society (2000)
-
(2000)
13th IEEE Computer Security Foundations Workshop
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
15
-
-
0032671775
-
A meta-notation for protocol analysis
-
IEEE Computer Society Press
-
Cervesato, I., Durgin, N., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: A meta-notation for protocol analysis. In: 12th Computer Security Foundations Workshop, pp. 55-69. IEEE Computer Society Press (1999)
-
(1999)
12th Computer Security Foundations Workshop
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
16
-
-
34047256433
-
The logical meeting point of multiset rewriting and process algebra
-
Technical Memo CHACS-5540-153, Center for High Assurance Computer Systems, Naval Research Laboratory, Washington, DC Sep
-
Cervesato, I.: The logical meeting point of multiset rewriting and process algebra: Progress report. Technical Memo CHACS-5540-153, Center for High Assurance Computer Systems, Naval Research Laboratory, Washington, DC (Sep. 2004)
-
(2004)
Progress report
-
-
Cervesato, I.1
-
17
-
-
0037190144
-
Maude: Specification and programming in rewriting logic
-
Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Quesada, J.F.: Maude: Specification and programming in rewriting logic. Theor. Comp. Sci. 285(2), 187-243 (2002)
-
(2002)
Theor. Comp. Sci
, vol.285
, Issue.2
, pp. 187-243
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Quesada, J.F.7
-
18
-
-
14844343148
-
Design of a CIL connector to Maude
-
Veith, H, Heintze, N, Clarke, E, eds
-
Denker, G.: Design of a CIL connector to Maude. In: Veith, H., Heintze, N., Clarke, E. (eds.) Workshop on Formal Methods and Computer Security (2000)
-
(2000)
Workshop on Formal Methods and Computer Security
-
-
Denker, G.1
-
19
-
-
0009899187
-
CAPSL intermediate language
-
Heintze, N, Clarke, E, eds, Trento, Italy
-
Denker, G., Millen, J.K.: CAPSL intermediate language. In: Heintze, N., Clarke, E. (eds.) Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP, Trento, Italy (1999)
-
(1999)
Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP
-
-
Denker, G.1
Millen, J.K.2
-
20
-
-
31844452704
-
A rewriting-based inference system for the NRL Protocol Analyzer: Grammar generation
-
Küsters, R, Mitchell, J, eds, Alexandria, VA, ACM. To appear Nov
-
Escobar, S., Meadows, C., Meseguer J.: A rewriting-based inference system for the NRL Protocol Analyzer: Grammar generation. In: Küsters, R., Mitchell, J. (eds.) Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering - FMSE 2005. Alexandria, VA, ACM. To appear (Nov. 2005)
-
(2005)
Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering - FMSE
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
22
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using FDR
-
Proceedings of TACAS, of, Springer-Verlag
-
Lowe, G.: Breaking and fixing the needham-schroeder public-key protocol using FDR. In: Proceedings of TACAS, vol. 1055 of Lecture Notes in Computer Science, pp. 147-166. Springer-Verlag (1996)
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
23
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C.: The NRL protocol analyzer: an overview. J. Logic Progr. 26(2), 113-131 (1996)
-
(1996)
J. Logic Progr
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
24
-
-
0027113376
-
Conditional rewriting logic as a unified model of concurrency
-
Meseguer, J.: Conditional rewriting logic as a unified model of concurrency. Theor. Comp. Sci. 96, 73-155 (1992)
-
(1992)
Theor. Comp. Sci
, vol.96
, pp. 73-155
-
-
Meseguer, J.1
-
25
-
-
14844359589
-
A CAPSL connector to Athena
-
Veith, H, Heintze, N, Clarke, E, eds
-
Millen, J.: A CAPSL connector to Athena. In: Veith, H., Heintze, N., Clarke, E. (eds.) Workshop of Formal Methods and Computer Security (2000)
-
(2000)
Workshop of Formal Methods and Computer Security
-
-
Millen, J.1
-
27
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis. In: 8th ACM Conference on Computer and Communication Security
-
Millen, J., Shmatikov, V.: Constraint solving for bounded-process cryptographic protocol analysis. In: 8th ACM Conference on Computer and Communication Security, pp. 166-175. ACM SIGSAC (2001)
-
(2001)
ACM SIGSAC
, pp. 166-175
-
-
Millen, J.1
Shmatikov, V.2
-
29
-
-
0030705405
-
Automated analysis of cryptographic protocols using murφ
-
IEEE Computer Society Press
-
Mitchell, J.C., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using murφ. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 141-153. IEEE Computer Society Press (1997)
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 141-153
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
30
-
-
0023247970
-
Efficient and timely mutual authentication
-
Otway, D., Rees, O.: Efficient and timely mutual authentication. Oper. Sys. Rew. 21(1), 8-10 (1987)
-
(1987)
Oper. Sys. Rew
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
31
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.: The inductive approach to verifying cryptographic protocols. J. Comp. Security 6(1), 85-128 (1998)
-
(1998)
J. Comp. Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.1
-
33
-
-
34047244224
-
-
Stehr, M.-O.: CINNI - A generic calculus of explicit substitutions and its application to λ.-, σ- and π-calculi. In: Futatsugi, K. (ed.) 3rd International Workshop on Rewriting Logic and its Applications, 36 of ENTCS, pp. 71-92. Elsevier(2000)http//www.elsevier.nl/locate/entcs/ volume36.html
-
Stehr, M.-O.: CINNI - A generic calculus of explicit substitutions and its application to λ.-, σ- and π-calculi. In: Futatsugi, K. (ed.) 3rd International Workshop on Rewriting Logic and its Applications, vol. 36 of ENTCS, pp. 71-92. Elsevier(2000)http//www.elsevier.nl/locate/entcs/ volume36.html
-
-
-
-
34
-
-
34047252369
-
-
Stehr, M.-O.: Programming, Specification, and Interactive Theorem Proving - Towards a Unified Language based on Equational Logic, Rewriting Logic, and Type Theory. Doctoral Thesis, Universität Hamburg, Fachbereich Informatik, Germany (2002), http://www.sub.uni-hamburg.de/disse/810/
-
Stehr, M.-O.: Programming, Specification, and Interactive Theorem Proving - Towards a Unified Language based on Equational Logic, Rewriting Logic, and Type Theory. Doctoral Thesis, Universität Hamburg, Fachbereich Informatik, Germany (2002), http://www.sub.uni-hamburg.de/disse/810/
-
-
-
-
35
-
-
33645292352
-
The open calculus of constructions (part i): An equational type theory with dependent types for programming, specification, and interactive theorem proving
-
Stehr, M.-O.: The open calculus of constructions (part i): An equational type theory with dependent types for programming, specification, and interactive theorem proving. Fundamenta Informaticae 68(1-2), 131-174 (2005)
-
(2005)
Fundamenta Informaticae
, vol.68
, Issue.1-2
, pp. 131-174
-
-
Stehr, M.-O.1
-
36
-
-
33645298786
-
The open calculus of constructions (part ii): An equational type theory with dependent types for programming, specification, and interactive theorem proving
-
Stehr, M.-O.: The open calculus of constructions (part ii): An equational type theory with dependent types for programming, specification, and interactive theorem proving. Fundamenta Informaticae 68(3), 249-288 (2005)
-
(2005)
Fundamenta Informaticae
, vol.68
, Issue.3
, pp. 249-288
-
-
Stehr, M.-O.1
-
37
-
-
9444283908
-
Pure type systems in rewriting logic
-
From Object-Orientation to Formal Methods: Essays in Memory of Ole-Johan Dahl, of, Springer-Varlag
-
Stehr, M.-O., Meseguer, J.: Pure type systems in rewriting logic. In: From Object-Orientation to Formal Methods: Essays in Memory of Ole-Johan Dahl, vol. 2635 of LNCS. Springer-Varlag (2004)
-
(2004)
LNCS
, vol.2635
-
-
Stehr, M.-O.1
Meseguer, J.2
-
38
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
IEEE Computer Society
-
Thayer, J., Herzog, J., Guttman, J.: Strand spaces: Why is a security protocol correct? In: 1998 IEEE Symposium on Security and Privacy, pp. 160-171. IEEE Computer Society (1998)
-
(1998)
1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Thayer, J.1
Herzog, J.2
Guttman, J.3
-
39
-
-
12344320856
-
A concurrent logical framework I: Judgments and properties
-
Technical Report CMU-CS-02-101, Department of Computer Science, Carnegie Mellon University
-
Watkins, K., Cervesato, I., Pfenning, F., Walker, D.: A concurrent logical framework I: Judgments and properties. Technical Report CMU-CS-02-101, Department of Computer Science, Carnegie Mellon University (2003)
-
(2003)
-
-
Watkins, K.1
Cervesato, I.2
Pfenning, F.3
Walker, D.4
|