-
1
-
-
84957872542
-
Reasoning about Cryptographic Protocols in the Spi Calculus
-
Proc. CONCUR'97, Springer
-
M. Abadi and A. D. Gordon, "Reasoning about Cryptographic Protocols in the Spi Calculus," in Proc. CONCUR'97, ser. LNCS, vol. 1243. Springer, 1997, pp. 59-73.
-
(1997)
ser. LNCS
, vol.1243
, pp. 59-73
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
84974597207
-
Non Interference for the Analysis of Cryptographic Protocols
-
Proc. ICALP'OO, Springer
-
R. Focardi, R. Gorrieri, and F. Martinelli, "Non Interference for the Analysis of Cryptographic Protocols," in Proc. ICALP'OO, ser. LNCS, vol. 1853. Springer, 2000, pp. 354-372.
-
(2000)
ser. LNCS
, vol.1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
3
-
-
84948972230
-
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques
-
Proc. TACAS'99, Springer
-
D. Marchignoli and F. Martinelli, "Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques," in Proc. TACAS'99, ser. LNCS, vol. 1579. Springer, 1999, pp. 148-162.
-
(1999)
ser. LNCS
, vol.1579
, pp. 148-162
-
-
Marchignoli, D.1
Martinelli, F.2
-
4
-
-
84955602379
-
Formal Verification of Cryptographic Protocols: A Survey
-
Proc. ASIACRYPT'94, Springer
-
C. Meadows, "Formal Verification of Cryptographic Protocols: a Survey," in Proc. ASIACRYPT'94, ser. LNCS, vol. 917. Springer, 1995, pp. 135-150.
-
(1995)
ser. LNCS
, vol.917
, pp. 135-150
-
-
Meadows, C.1
-
5
-
-
35848959071
-
Using CSP to Detect Errors in the TMN Protocol
-
G. Lowe and A. W. Roscoe, "Using CSP to Detect Errors in the TMN Protocol," Software Engineering, vol. 23, no. 10, pp. 659-669, 1997.
-
(1997)
Software Engineering
, vol.23
, Issue.10
, pp. 659-669
-
-
Lowe, G.1
Roscoe, A.W.2
-
6
-
-
0031627781
-
Efficient Finite State Analysis for Large Security Protocols
-
IEEE Press
-
V. Shmatikov and U. Stern, "Efficient Finite State Analysis for Large Security Protocols," in Proc. CSFW'98. IEEE Press, 1998, pp. 105-116.
-
(1998)
Proc. CSFW'98
, pp. 105-116
-
-
Shmatikov, V.1
Stern, U.2
-
7
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F. J. Thayer, J. C. Herzog, and J. D. Guttman, "Strand spaces: proving security protocols correct," Journal of Computer Security, vol. 7, no. 1, pp. 191-230, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 191-230
-
-
Thayer, F.J.1
Herzog, J.C.2
Guttman, J.D.3
-
8
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proc. TACAS'96, Springer
-
G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR," in Proc. TACAS'96, ser. LNCS, vol. 1055. Springer, 1996, pp. 147-166.
-
(1996)
ser. LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
9
-
-
0030705405
-
Automated Analysis of Cryptographic Protocols using Murphi
-
IEEE Press
-
J. C. Mitchell, M. Mitchell, and U. Stern, "Automated Analysis of Cryptographic Protocols using Murphi," in Proc. S&P'97. IEEE Press, 1997, pp. 141-153.
-
(1997)
Proc. S&P'97
, pp. 141-153
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
11
-
-
33644764725
-
Formal analysis of some secure procedures for certificate delivery
-
F. Martinelli, M. Petrocchi, and A. Vaccarelli, "Formal analysis of some secure procedures for certificate delivery," Software, Testing, Verification and Reliability, vol. 16, no. 1, pp. 33-59, 2006.
-
(2006)
Software, Testing, Verification and Reliability
, vol.16
, Issue.1
, pp. 33-59
-
-
Martinelli, F.1
Petrocchi, M.2
Vaccarelli, A.3
-
12
-
-
85031620050
-
A Semantics for a Logic of Authentication
-
ACM Press
-
M. Abadi and M. R. Turtle, "A Semantics for a Logic of Authentication," in Proc. SPDC'91. ACM Press, 1991, pp. 201-216.
-
(1991)
Proc. SPDC'91
, pp. 201-216
-
-
Abadi, M.1
Turtle, M.R.2
-
14
-
-
0030705795
-
Proving Properties of Security Protocols by Induction
-
IEEE Press
-
L. C. Paulson, "Proving Properties of Security Protocols by Induction," in Proc. CSFW'97. IEEE Press, 1997, pp. 70-83.
-
(1997)
Proc. CSFW'97
, pp. 70-83
-
-
Paulson, L.C.1
-
15
-
-
0001772130
-
Secrecy by Typing in Security Protocols
-
M. Abadi, "Secrecy by Typing in Security Protocols," Journal of the ACM, vol. 46, no. 5, pp. 749-786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
16
-
-
0035838828
-
Static Analysis for the pi-Calculus with Applications to Security
-
C. Bodei, P. Degano, F. Nielson, and H. R. Nielson, "Static Analysis for the pi-Calculus with Applications to Security," Information and Computation, vol. 168, no. 1, pp. 68-92, 2001.
-
(2001)
Information and Computation
, vol.168
, Issue.1
, pp. 68-92
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
17
-
-
34548239383
-
A Team Automaton Scenario for the Analysis of Security Properties in Communication Protocols
-
accepted for publication
-
M. H. ter Beek, G. Lenzini, and M. Petrocchi, "A Team Automaton Scenario for the Analysis of Security Properties in Communication Protocols," Journal of Automata, Languages and Combinatorics, accepted for publication, 2006.
-
(2006)
Journal of Automata, Languages and Combinatorics
-
-
ter Beek, M.H.1
Lenzini, G.2
Petrocchi, M.3
-
18
-
-
84958046259
-
A uniform approach for the definition of security properties
-
Proc. FM'99, Springer
-
R. Focardi and F. Martinelli, "A uniform approach for the definition of security properties," in Proc. FM'99, ser. LNCS, vol. 1708. Springer, 1999, pp. 794-813.
-
(1999)
ser. LNCS
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, F.2
-
19
-
-
0037209815
-
Analysis of security protocols as open systems
-
F. Martinelli, "Analysis of security protocols as open systems," Theoretical Computer Science, vol. 290, no. 1, pp. 1057-1106, 2003.
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 1057-1106
-
-
Martinelli, F.1
-
21
-
-
34548218916
-
Identity Federation for Services in Convergent Networks
-
M. Bonifati, P. De Lutiis, C. Moiso, E. Morello, and L. Sarchi, "Identity Federation for Services in Convergent Networks," in Proc. ICIN'06, 2006, pp. 109-114.
-
(2006)
Proc. ICIN'06
, pp. 109-114
-
-
Bonifati, M.1
De Lutiis, P.2
Moiso, C.3
Morello, E.4
Sarchi, L.5
-
22
-
-
34548224360
-
-
Liberty Alliance Project, Online, Available
-
Liberty Alliance Project. [Online]. Available: www.projectliberty.org
-
-
-
-
23
-
-
34548267813
-
-
T. Wason et al. (2005) Liberty ID-FF Architecture Overview v1.2. [Online]. Available: www.projectliberty.org/liberty/specifications.-l
-
T. Wason et al. (2005) Liberty ID-FF Architecture Overview v1.2. [Online]. Available: www.projectliberty.org/liberty/specifications.-l
-
-
-
-
24
-
-
34548225645
-
-
OASIS Security Services TC. (2005) Security Assertion Markup Language SAML v2.0. [Online]. Available: www.oasis-open.org/specs/
-
OASIS Security Services TC. (2005) Security Assertion Markup Language SAML v2.0. [Online]. Available: www.oasis-open.org/specs/
-
-
-
-
25
-
-
0020720357
-
On the Security of Public Key Protocols
-
D. Dolev and A. Yao, "On the Security of Public Key Protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
26
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
G. Lowe, "An attack on the Needham-Schroeder public key authentication protocol," Information Processing Letters, vol. 56, no. 3, pp. 131-136, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-136
-
-
Lowe, G.1
-
28
-
-
0029193016
-
Partial Model Checking
-
IEEE Press
-
H. R. Andersen, "Partial Model Checking," in Proc. LICS'95. IEEE Press, 1995, pp. 398-407.
-
(1995)
Proc. LICS'95
, pp. 398-407
-
-
Andersen, H.R.1
|