-
1
-
-
85031620050
-
A semantics for a logic of authentication
-
ACM Press
-
M. Abadi and M. R. Tuttle. A semantics for a logic of authentication. In Proc. of PODC '91, pp. 201-216. ACM Press, 1991.
-
(1991)
Proc. of PODC '91
, pp. 201-216
-
-
Abadi, M.1
Tuttle, M.R.2
-
2
-
-
19144367628
-
Towards an awareness-based semantics for security protocol analysis
-
1 of ENTCS, pp, Elsevier
-
R. Accorsi, D. Basin, and L. Viganò. Towards an awareness-based semantics for security protocol analysis. In Post Proc. of LACP V'01, volume 55(1) of ENTCS, pp 5-24. Elsevier, 2003.
-
(2003)
Post Proc. of LACP V'01
, vol.55
, pp. 5-24
-
-
Accorsi, R.1
Basin, D.2
Viganò, L.3
-
3
-
-
35048888740
-
Proving correctness of the basic TESLA multicast stream authentication protocol with TAME
-
M. Archer. Proving correctness of the basic TESLA multicast stream authentication protocol with TAME. In Proc. of WITS'02, 2002.
-
(2002)
Proc. of WITS'02
-
-
Archer, M.1
-
4
-
-
84958778419
-
On a, limitation of BAN logic
-
Springer-Verlag
-
C. Boyd and W. Mao. On a, limitation of BAN logic. In Proc. of EUROCRYPT '93, pp. 240-247. Springer-Verlag, 1994.
-
(1994)
Proc. of EUROCRYPT '93
, pp. 240-247
-
-
Boyd, C.1
Mao, W.2
-
5
-
-
84957023134
-
Analysing a stream authentication protocol using model checking
-
Springer-Verlag
-
P. J. Broadfoot and G. Lowe. Analysing a stream authentication protocol using model checking. In Proc. of ESORICS'02, pp. 146-161. Springer-Verlag, 2002.
-
(2002)
Proc. of ESORICS'02
, pp. 146-161
-
-
Broadfoot, P.J.1
Lowe, G.2
-
6
-
-
0000523051
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. In Proc. of the. Royal Society of London A, volume 426, pp. 233-271, 1989.
-
(1989)
Proc. of the. Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
85037030721
-
Design and synthesis of synchronization skeletons for branching-time temporal logic
-
Proc. of WLP, of, Springer-Verlag
-
E. Clarke and E. Emerson. Design and synthesis of synchronization skeletons for branching-time temporal logic. In Proc. of WLP, volume 131 of LNCS, pp. 52-71. Springer-Verlag, 1981.
-
(1981)
LNCS
, vol.131
, pp. 52-71
-
-
Clarke, E.1
Emerson, E.2
-
8
-
-
5644231064
-
-
C. Dixon, M. C. Fernandez Gago, M. Fisher, and W. van der Hoek. Using temporal logics of knowledge in the formal verification of security protocols. In Proc. of TIME'04, PP- 148-151. IEEE, 2004.
-
C. Dixon, M. C. Fernandez Gago, M. Fisher, and W. van der Hoek. Using temporal logics of knowledge in the formal verification of security protocols. In Proc. of TIME'04, PP- 148-151. IEEE, 2004.
-
-
-
-
9
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. Inf. Theory, 29(2): 198-208, 1983.
-
(1983)
IEEE Trans. Inf. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
10
-
-
0023842375
-
Belief, awareness, and limited reasoning
-
R. Fagin and J. Y. Halpern. Belief, awareness, and limited reasoning. Artificial Intelligence, 34(1):39-76, 1988.
-
(1988)
Artificial Intelligence
, vol.34
, Issue.1
, pp. 39-76
-
-
Fagin, R.1
Halpern, J.Y.2
-
13
-
-
0009095248
-
Algorithmic knowledge
-
Morgan Kaufmann Publishers
-
J. Y. Halpern, Y. Moses, and M. Y. Vardi. Algorithmic knowledge. In Proc. of TARK 1994, pages 255-66. Morgan Kaufmann Publishers, 1994.
-
(1994)
Proc. of TARK 1994
, pp. 255-266
-
-
Halpern, J.Y.1
Moses, Y.2
Vardi, M.Y.3
-
14
-
-
35248868917
-
Modeling Adversaries in a Logic for Security Protocol Analysis
-
Proc. of FASec'02, of, Springer-Verlag
-
J.Y. Halpern and R. Pucella. Modeling Adversaries in a Logic for Security Protocol Analysis. In Proc. of FASec'02, volume 2629 of LNCS, pp. 115-132. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2629
, pp. 115-132
-
-
Halpern, J.Y.1
Pucella, R.2
-
16
-
-
33745764348
-
A combination of explicit and deductive knowledge with branching time: Completeness and decidability results
-
Post-proc. of DALT'05, of, To appear
-
A. Lomuscio and B. Woźna. A combination of explicit and deductive knowledge with branching time: completeness and decidability results. In Post-proc. of DALT'05, volume 3904 of LNAI. 2006. To appear.
-
(2006)
LNAI
, vol.3904
-
-
Lomuscio, A.1
Woźna, B.2
-
17
-
-
33747042605
-
MCMAS: A model checker for multi-agent systems
-
Springer Verlag, March, To appear
-
A. Lomuscio and F. Raimondi. MCMAS: A model checker for multi-agent systems. In Proc. of TACAS'06. Springer Verlag, March, 2006. To appear.
-
(2006)
Proc. of TACAS'06
-
-
Lomuscio, A.1
Raimondi, F.2
-
18
-
-
0025405980
-
A critique of the Burrows Abadi Needham logic
-
D. M. Nessett. A critique of the Burrows Abadi Needham logic. Operating Systems Review, 24(3):35-38, 1990.
-
(1990)
Operating Systems Review
, vol.24
, Issue.3
, pp. 35-38
-
-
Nessett, D.M.1
-
19
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
A. Perrig, R. Canetti, J.D. Tygar, and Dawn X. Song. Efficient authentication and signing of multicast streams over lossy channels. In IEEE Symposium on Security and Privacy, pp. 56-73, 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.X.4
-
20
-
-
67349103476
-
Deductive Algorithmic Knowledge
-
AI&M 22-2004
-
R. Pucella. Deductive Algorithmic Knowledge. In Proc. of SAIM'04, AI&M 22-2004, 2004.
-
(2004)
Proc. of SAIM'04
-
-
Pucella, R.1
-
21
-
-
32144452580
-
Deciding knowledge properties of security protocols
-
R. Ramanujam and S. P. Suresh. Deciding knowledge properties of security protocols. In Proc. of TARK'05, pp. 218-235, 2005.
-
(2005)
Proc. of TARK'05
, pp. 218-235
-
-
Ramanujam, R.1
Suresh, S.P.2
|