-
1
-
-
35248848311
-
Computer-assisted verification of a protocol for certified email
-
SAS '03, of
-
M. Abadi and B. Blanchet. Computer-assisted verification of a protocol for certified email. In SAS '03, volume 2694 of LNCS, pages 316-335, 2003.
-
(2003)
LNCS
, vol.2694
, pp. 316-335
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Trans. Software Eng., 22(1):6-15, 1996.
-
(1996)
IEEE Trans. Software Eng
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
3
-
-
34547286095
-
Defining liveness
-
85-650, Dept. of Computer Science, Cornell University, October
-
B. Alpern and F. Schneider. Defining liveness. Technical Report TR 85-650, Dept. of Computer Science, Cornell University, October 1984.
-
(1984)
Technical Report TR
-
-
Alpern, B.1
Schneider, F.2
-
5
-
-
0034317075
-
Key agreement in ad hoc networks
-
N. Asokan and P. Ginzboorg. Key agreement in ad hoc networks. Computer Communications, 23(17):1627-1637, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
7
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup, and M. Waidner. Optimistic fair exchange of digital signatures. IEEE J. Selected Areas in Communications, 18(4):593-610, 2000.
-
(2000)
IEEE J. Selected Areas in Communications
, vol.18
, Issue.4
, pp. 593-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
8
-
-
84937578206
-
Simulating reliable links with unreliable links in the presence of process crashes
-
WDAG '96, of, Springer
-
A. Basu, B. Charron-Bost, and S. Toueg. Simulating reliable links with unreliable links in the presence of process crashes. In WDAG '96, volume 1151 of LNCS, pages 105-122. Springer, 1996.
-
(1996)
LNCS
, vol.1151
, pp. 105-122
-
-
Basu, A.1
Charron-Bost, B.2
Toueg, S.3
-
9
-
-
84949486769
-
Mechanical proofs about a non-repudiation protocol
-
TPHOL'01, of, Springer
-
G. Bella and L. C. Paulson. Mechanical proofs about a non-repudiation protocol. In TPHOL'01, volume 2152 of LNCS, pages 91-104. Springer, 2001.
-
(2001)
LNCS
, vol.2152
, pp. 91-104
-
-
Bella, G.1
Paulson, L.C.2
-
10
-
-
0021870594
-
Algebra of communicating processes with abstraction
-
J. Bergstra and J. Klop. Algebra of communicating processes with abstraction. Theor. Comput. Sci., 37:77-121, 1985.
-
(1985)
Theor. Comput. Sci
, vol.37
, pp. 77-121
-
-
Bergstra, J.1
Klop, J.2
-
11
-
-
33646736777
-
On the quest for impartiality: Design and analysis of a fair non-repudiation protocol
-
ICICS'05, of, Springer
-
J. Cederquist, R. Corin, and M. Torabi Dashti. On the quest for impartiality: Design and analysis of a fair non-repudiation protocol. In ICICS'05, volume 3783 of LNCS, pages 27 - 39. Springer, 2005.
-
(2005)
LNCS
, vol.3783
, pp. 27-39
-
-
Cederquist, J.1
Corin, R.2
Torabi Dashti, M.3
-
13
-
-
20144373491
-
The Dolev-Yao intruder is the most powerful attacker
-
IEEE Computer Society Press, 16-19 June
-
I. Cervesato. The Dolev-Yao intruder is the most powerful attacker. In LICS'01. IEEE Computer Society Press, 16-19 June 2001.
-
(2001)
LICS'01
-
-
Cervesato, I.1
-
14
-
-
84937559950
-
Automated unbounded verification of security protocols
-
CAV '02, of, Springer
-
Y. Chevalier and L. Vigneron. Automated unbounded verification of security protocols. In CAV '02, volume 2404 of LNCS, pages 324-337. Springer, 2002.
-
(2002)
LNCS
, vol.2404
, pp. 324-337
-
-
Chevalier, Y.1
Vigneron, L.2
-
16
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans, on Information Theory, IT-29(2):198-208, 1983.
-
(1983)
IEEE Trans, on Information Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
17
-
-
34547382108
-
-
E. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of theoretical computer science (B): formal models and semantics, pages 995-1072. MIT Press, 1990.
-
E. Emerson. Temporal and modal logic. In J. van Leeuwen, editor, Handbook of theoretical computer science (vol. B): formal models and semantics, pages 995-1072. MIT Press, 1990.
-
-
-
-
18
-
-
16244392334
-
Temporal reasoning under generalized fairness constraints
-
Springer-Verlag
-
E. Emerson and C-L. Lei. Temporal reasoning under generalized fairness constraints. In STACS '86, pages 21-36. Springer-Verlag, 1985.
-
(1985)
STACS '86
, pp. 21-36
-
-
Emerson, E.1
Lei, C.-L.2
-
19
-
-
34547240491
-
-
R. Engelschall. URL rewriting engine. Apache HTTP Server Version 1.3
-
R. Engelschall. URL rewriting engine. Apache HTTP Server Version 1.3.
-
-
-
-
20
-
-
0022045868
-
Impossibility of distributed consensus with one faulty process
-
M. Fischer, N. Lynch, and M. Paterson. Impossibility of distributed consensus with one faulty process. J. ACM, 32(2):374-382, 1985.
-
(1985)
J. ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fischer, M.1
Lynch, N.2
Paterson, M.3
-
22
-
-
0001879305
-
The syntax and semantics of μCRL
-
Algebra of Communicating Processes, Springer
-
J. F. Groóte and A. Ponse. The syntax and semantics of μCRL. In Algebra of Communicating Processes, Workshops in Computing Series, pages 26-62. Springer, 1995.
-
(1995)
Workshops in Computing Series
, pp. 26-62
-
-
Groóte, J.F.1
Ponse, A.2
-
23
-
-
35248837018
-
On the security of fair non-repudiation protocols
-
ISC '03, of
-
S. Gürgens, C. Rudolph, and H. Vogt. On the security of fair non-repudiation protocols. In ISC '03, volume 2851 of LNCS, pages 193-207, 2003.
-
(2003)
LNCS
, vol.2851
, pp. 193-207
-
-
Gürgens, S.1
Rudolph, C.2
Vogt, H.3
-
24
-
-
0037268614
-
How to prevent type flaw attacks on security protocols
-
J. Heather, G. Lowe, and S. Schneider. How to prevent type flaw attacks on security protocols. J. Computer Security, 11(2):217-244, 2003.
-
(2003)
J. Computer Security
, vol.11
, Issue.2
, pp. 217-244
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
25
-
-
0018005391
-
Communicating sequential processes
-
C. A. R. Hoare. Communicating sequential processes. Commun. ACM, 21(8):666-677, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.8
, pp. 666-677
-
-
Hoare, C.A.R.1
-
26
-
-
27244431635
-
Constraint solving for contract-signing protocols
-
CONCUR '05, of, Springer
-
D. Kahler and R. Küsters. Constraint solving for contract-signing protocols. In CONCUR '05, volume 3653 of LNCS, pages 233-247. Springer, 2005.
-
(2005)
LNCS
, vol.3653
, pp. 233-247
-
-
Kahler, D.1
Küsters, R.2
-
27
-
-
0036836682
-
An intensive survey of non-repudiation protocols
-
November
-
S. Kremer, O. Markowitch, and J. Zhou. An intensive survey of non-repudiation protocols. Computer Communications, 25(17):1606-1621, November 2002.
-
(2002)
Computer Communications
, vol.25
, Issue.17
, pp. 1606-1621
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
28
-
-
84944080333
-
A game-based verification of non-repudiation and fair exchange protocols
-
CONCUR '01, of, Springer
-
S. Kremer and J. Raskin. A game-based verification of non-repudiation and fair exchange protocols. In CONCUR '01, volume 2154 of LNCS, pages 551-565. Springer, 2001.
-
(2001)
LNCS
, vol.2154
, pp. 551-565
-
-
Kremer, S.1
Raskin, J.2
-
29
-
-
0037332768
-
Efficient on-the-fly model-checking for regular alternation-free mu-calculus
-
R. Mateescu and M. Sighireanu. Efficient on-the-fly model-checking for regular alternation-free mu-calculus. Sei. Comput. Program., 46(3):255-281, 2003.
-
(2003)
Sei. Comput. Program
, vol.46
, Issue.3
, pp. 255-281
-
-
Mateescu, R.1
Sighireanu, M.2
-
30
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: Emerging issues and trends
-
C. Meadows. Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE J. Selected Areas in Communication, 21(2):44-54, 2003.
-
(2003)
IEEE J. Selected Areas in Communication
, vol.21
, Issue.2
, pp. 44-54
-
-
Meadows, C.1
-
31
-
-
0029272304
-
Three logics for branching bisimulation
-
R. De Nicola and F. Vaandrager. Three logics for branching bisimulation. J. ACM, 42(2):458-487, 1995.
-
(1995)
J. ACM
, vol.42
, Issue.2
, pp. 458-487
-
-
De Nicola, R.1
Vaandrager, F.2
-
32
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6(1-2):85-128, 1998.
-
(1998)
J. Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.1
-
33
-
-
49149133038
-
a temporal logic of concurrent programs
-
A. Pnueli. a temporal logic of concurrent programs. Theor. Comput. Sci., 13:45 - 60, 1981.
-
(1981)
Theor. Comput. Sci
, vol.13
, pp. 45-60
-
-
Pnueli, A.1
-
34
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
V. Shmatikov and J. Mitchell. Finite-state analysis of two contract signing protocols. Theor. Comput. Sci., 283(2):419-450, 2002.
-
(2002)
Theor. Comput. Sci
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.2
-
35
-
-
34547265412
-
Asynchronous optimistic fair exchange based on revocable items
-
Financial Cryptography, of, Springer
-
H. Vogt. Asynchronous optimistic fair exchange based on revocable items. In Financial Cryptography, volume 2742 of LNCS, pages 208-222. Springer, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 208-222
-
-
Vogt, H.1
-
36
-
-
84949477184
-
Using smart cards for fair exchange
-
WELCOM '01, of, Springer
-
H. Vogt, H. Pagnia, and F. Gärtner. Using smart cards for fair exchange. In WELCOM '01, volume 2232 of LNCS, pages 101-113. Springer, 2001.
-
(2001)
LNCS
, vol.2232
, pp. 101-113
-
-
Vogt, H.1
Pagnia, H.2
Gärtner, F.3
-
37
-
-
84961312272
-
Evolution of fair non-repudiation with TTP
-
ACISP '99, of, Springer
-
J. Zhou, R. Deng, and F. Bao. Evolution of fair non-repudiation with TTP. In ACISP '99, volume 1587 of LNCS, pages 258-269. Springer, 1999.
-
(1999)
LNCS
, vol.1587
, pp. 258-269
-
-
Zhou, J.1
Deng, R.2
Bao, F.3
|