-
1
-
-
84978977131
-
Formal eavesdropping and its computational interpretation
-
Proc. of Theoretical Aspects of Computer Software. (TACS 2001), Springer-Verlag
-
Abadi M., and Jürjens J. Formal eavesdropping and its computational interpretation. Proc. of Theoretical Aspects of Computer Software. (TACS 2001). LNCS volume 2215 (2001), Springer-Verlag 82-94
-
(2001)
LNCS
, vol.2215
, pp. 82-94
-
-
Abadi, M.1
Jürjens, J.2
-
2
-
-
26444497860
-
The AVISPA Tool for the automated validation of internet security protocols and applications
-
17th International Conference on Computer Aided Verification. CAV'2005, Springer
-
Armando A., Basin D., Boichut Y., Chevalier Y., Compagna L., Cuellar J., Hankes Drielsma P., Héam P.-C., Kouchnarenko O., Mantovani J., Mödersheim S., von Oheimb D., Rusinowitch M., Santiago J., Turuani M., Viganò L., and Vigneron L. The AVISPA Tool for the automated validation of internet security protocols and applications. 17th International Conference on Computer Aided Verification. CAV'2005. LNCS volume 3576 (2005), Springer 281-285
-
(2005)
LNCS
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Hankes Drielsma, P.7
Héam, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
3
-
-
0034822279
-
-
Blanchet, B. (2001). An efficient cryptographic protocol verifier based on prolog rules. In Proc. of the 14th Computer Security Foundations Workshop (CSFW'01)
-
-
-
-
4
-
-
24644437051
-
Computationally Sound, Automated Proofs for Security Protocols
-
Proc. 14th European Symposium on Programming. (ESOP'05), Springer
-
Cortier V., and Warinschi B. Computationally Sound, Automated Proofs for Security Protocols. Proc. 14th European Symposium on Programming. (ESOP'05). Lecture Notes in Computer Science volume 3444 (2005), Springer 157-171
-
(2005)
Lecture Notes in Computer Science
, vol.3444
, pp. 157-171
-
-
Cortier, V.1
Warinschi, B.2
-
6
-
-
34347254388
-
-
Herzog, J.C. (2004). Computational Soundness for Standard Asumptions of Formal Cryptography. Ph thesis, Massachusetts Institute of Technology
-
-
-
-
7
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proc. of Tools and algoritms for the construction and analysis fof systems. (TACAS'96), Springer-Verlag
-
Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Proc. of Tools and algoritms for the construction and analysis fof systems. (TACAS'96). LNCS volume 1055 (1996), Springer-Verlag 147-166
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
8
-
-
0030678388
-
-
Lowe, G. (1997a). Casper: A compiler for the analysis of security protocols. In Proc. of 10th Computer Security Foundations Workshop (CSFW'97). IEEE Computer Society Press
-
-
-
-
9
-
-
84994742813
-
-
Lowe, G. (1997b). A hierarchy of authentication specifications. In Proc. of the 10th Computer Security Foundations Workshop (CSFW'97). IEEE Computer Society Press
-
-
-
-
10
-
-
0344875574
-
Analysing protocols subject to guessing attacks
-
Lowe G. Analysing protocols subject to guessing attacks. Journal of Computer Security 12 1 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
-
-
Lowe, G.1
-
11
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
(TCC 2004), Springer-Verlag
-
Micciancio D., and Warinschi B. Soundness of formal encryption in the presence of active adversaries. Theory of Cryptography Conference. (TCC 2004) (2004), Springer-Verlag 133-151
-
(2004)
Theory of Cryptography Conference
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
12
-
-
0034822801
-
-
Rusinowitch, M. and Turuani, M. (2001). Protocol insecurity with finite number of sessions is NP-complete. In Proc. of the 14th Computer Security Foundations Workshop (CSFW'01), pages 174-190. IEEE Computer Society Press
-
-
-
-
13
-
-
0032678887
-
-
Song, D.X. (1999). Athena: A new efficient automatic checker for security protocol analysis. In Proc. of the 12th Computer Security Foundations Workshop (CSFW'99). IEEE Computer Society Press
-
-
-
|