-
2
-
-
19144369108
-
Programming Satan's computer
-
J. van Leeuwen, editor, Computer Science Today: Recent Trends and Developments, of, Springer
-
R. Anderson and R. Needham. Programming Satan's computer. In J. van Leeuwen, editor, Computer Science Today: Recent Trends and Developments, volume 1000 of LNCS, pages 426-440. Springer, 1995.
-
(1995)
LNCS
, vol.1000
, pp. 426-440
-
-
Anderson, R.1
Needham, R.2
-
4
-
-
34547330121
-
Policy advisor for WSE 3.0
-
Microsoft Press
-
K. Bhargavan, C. Fournet, and A. D. Gordon. Policy advisor for WSE 3.0. In Web Service Security: Scenarios, patterns, and implementation guidance for Web Services Enhancements (WSE) 3.0. Microsoft Press, 2006.
-
(2006)
Web Service Security: Scenarios, patterns, and implementation guidance for Web Services Enhancements (WSE) 3.0
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
5
-
-
35048821943
-
TulaFale: A security tool for web services
-
International Symposium on Formal Methods for Components and Objects FMCO'03, of, Springer
-
K. Bhargavan, C. Fournet, A. D. Gordon, and R. Pucella. TulaFale: A security tool for web services. In International Symposium on Formal Methods for Components and Objects (FMCO'03), volume 3188 of LNCS, pages 197-222. Springer, 2004.
-
(2004)
LNCS
, vol.3188
, pp. 197-222
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Pucella, R.4
-
8
-
-
0033718532
-
TAPS : A first-order verifier for cryptographic protocols
-
IEEE Computer Society Press
-
E. Cohen. TAPS : A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop, pages 144-158. IEEE Computer Society Press, 2000.
-
(2000)
13th IEEE Computer Security Foundations Workshop
, pp. 144-158
-
-
Cohen, E.1
-
9
-
-
34547282572
-
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208,1983. [10] J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), 3385 ïéLNCS, pages 363-379. Springer, 2005.
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208,1983. [10] J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 ïéLNCS, pages 363-379. Springer, 2005.
-
-
-
-
11
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21 (12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
12
-
-
84958777572
-
AGVI - automatic generation, verification, and implementation of security protocols
-
13th Conference on Computer Aided Verification CAV, Springer
-
A. Perrig, D. Song, and D. Phan. AGVI - automatic generation, verification, and implementation of security protocols. In 13th Conference on Computer Aided Verification (CAV), LNCS, pages 241-245. Springer, 2001.
-
(2001)
LNCS
, pp. 241-245
-
-
Perrig, A.1
Song, D.2
Phan, D.3
-
13
-
-
3042621964
-
Spi2Java: Automatic cryptographic protocol Java code generation from spi calculus
-
D. Pozza, R. Sisto, and L. Durante. Spi2Java: automatic cryptographic protocol Java code generation from spi calculus. In 18th International Conference on Advanced Information Networking and Applications (AINA 2004), volume 1, pages 400-405, 2004.
-
(2004)
18th International Conference on Advanced Information Networking and Applications (AINA 2004)
, vol.1
, pp. 400-405
-
-
Pozza, D.1
Sisto, R.2
Durante, L.3
-
14
-
-
34547371390
-
-
D. Syme. F#, 2005. Project website at http:// research.microsoft.com/ fsharp/.
-
D. Syme. F#, 2005. Project website at http:// research.microsoft.com/ fsharp/.
-
-
-
|