-
1
-
-
26444497860
-
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganó, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganó, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
-
-
-
-
2
-
-
24344446006
-
Using Isabelle to prove properties of the Kerberos authentication system
-
Orman, H, Meadows, C, eds
-
Bella, G., Paulson, L.C.: Using Isabelle to prove properties of the Kerberos authentication system. In: Orman, H., Meadows, C., (eds). Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols (CD-ROM) (DIMACS'97) (1997)
-
(1997)
Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols (CD-ROM) (DIMACS'97)
-
-
Bella, G.1
Paulson, L.C.2
-
3
-
-
0003334513
-
New generation of Uppaal
-
Proc. of the Int. Workshop on Software Tools for Technology Transfer STTT'98
-
Bengtsson, J., Larsen, K.G., Larsson, F., Pettersson, P., Yi, W., Weise, C.: New generation of Uppaal. In: Proc. of the Int. Workshop on Software Tools for Technology Transfer (STTT'98), BRICS Notes Series, pp. 43-52 (1998)
-
(1998)
BRICS Notes Series
, pp. 43-52
-
-
Bengtsson, J.1
Larsen, K.G.2
Larsson, F.3
Pettersson, P.4
Yi, W.5
Weise, C.6
-
5
-
-
24144457604
-
A Symbolic Decision Procedure for Cryptographic Protocols with Time Stamps
-
Bozga, L., Ene, C., Lakhnech, Y.: A Symbolic Decision Procedure for Cryptographic Protocols with Time Stamps. Journal of Logic and Algebraic Programming 65(1), 1-35 (2005)
-
(2005)
Journal of Logic and Algebraic Programming
, vol.65
, Issue.1
, pp. 1-35
-
-
Bozga, L.1
Ene, C.2
Lakhnech, Y.3
-
6
-
-
0000523051
-
A Logic of Authentication
-
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. In: Proceedings of the Royal Society of London A, vol. 426, pp. 233-271 (1989)
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0003568551
-
A survey of authentication protocol literature
-
Technical Report 1.0
-
Clark, J.A., Jacob, J.L.: A survey of authentication protocol literature. Technical Report 1.0, http://www.cs.york.ac.ukjac/papers/drareview.ps.gz (1997)
-
(1997)
-
-
Clark, J.A.1
Jacob, J.L.2
-
8
-
-
0039334690
-
Verifying security protocols with Brutus
-
Clarke, E.M., Jha, S., Marrero, W.: Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology 9(4), 443-487 (2000)
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
10
-
-
20444436469
-
Timed model checking of security protocols
-
Atluri, V, Backes, M, Basin, D, Waidner, M, eds, ACM Press, New York
-
Corin, R., Etalle, S., Hartel, P.H., Mader, A.: Timed model checking of security protocols. In: Atluri, V., Backes, M., Basin, D., Waidner, M. (eds.) 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE), pp. 23-32. ACM Press, New York (2004)
-
(2004)
2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE)
, pp. 23-32
-
-
Corin, R.1
Etalle, S.2
Hartel, P.H.3
Mader, A.4
-
11
-
-
35248826437
-
VerICS: A tool for verifying timed automata and Estelle specifications
-
Garavel, H, Hatcliff, J, eds, ETAPS 2003 and TACAS 2003, Springer, Heidelberg
-
Dembiński, P., Janowska, A., Janowski, P., Penczek, W., Pólrola, A., Szreter, M., Woźna, B., Zbrzezny, A.: VerICS: A tool for verifying timed automata and Estelle specifications. In: Garavel, H., Hatcliff, J. (eds.) ETAPS 2003 and TACAS 2003. LNCS, vol. 2619, pp. 278-283. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2619
, pp. 278-283
-
-
Dembiński, P.1
Janowska, A.2
Janowski, P.3
Penczek, W.4
Pólrola, A.5
Szreter, M.6
Woźna, B.7
Zbrzezny, A.8
-
13
-
-
84944070422
-
Analysing time dependent security properties in csp using pvs
-
Cuppens, F, Deswarte, Y, Gollmann, D, Waidner, M, eds, ESORICS 2000, Springer, Heidelberg
-
Evans, N., Schneider, S.: Analysing time dependent security properties in csp using pvs. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol. 1895, pp. 222-237. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1895
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
16
-
-
34548609248
-
Verifying security protocols with timestamps via translation to timed automata. In: Czaja, L., (ed)
-
Warsaw University Press, pp
-
Jakubowska, G., Penczek, W., Srebrny, M.: Verifying security protocols with timestamps via translation to timed automata. In: Czaja, L., (ed). In: Proc. of the Int. Workshop on Concurrency, Specification and Programming (CS&P'05), Warsaw University Press, pp. 100-115 (2005)
-
(2005)
Proc. of the Int. Workshop on Concurrency, Specification and Programming (CS&P'05)
, pp. 100-115
-
-
Jakubowska, G.1
Penczek, W.2
Srebrny, M.3
-
17
-
-
0003257683
-
Using state space exploration and a natural deduction style message derivation engine to verify security protocols
-
Gries, D, De Roever, W.P, eds, Chapmann and Hall, Sydney
-
Jha, S., Clarke, E.M., Marrero, W.: Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In: Gries, D., De Roever, W.P. (eds.) Proceedings of the IFIP Working Conference on Programming Concepts and Methods (PROCOMET'98), pp. 87-106. Chapmann and Hall, Sydney (1998)
-
(1998)
Proceedings of the IFIP Working Conference on Programming Concepts and Methods (PROCOMET'98)
, pp. 87-106
-
-
Jha, S.1
Clarke, E.M.2
Marrero, W.3
-
19
-
-
38149047136
-
Verifying Cryptographic Protocols modeled by networks of automata
-
Humboldt University Press, pp
-
Kurkowski, M., Penczek, W. : Verifying Cryptographic Protocols modeled by networks of automata. In: Proc. of CS&P'06, Humboldt University Press, pp. 292-303 (2006)
-
(2006)
Proc. of CS&P'06
, pp. 292-303
-
-
Kurkowski, M.1
Penczek, W.2
-
20
-
-
38149070535
-
SAT-based Verification of Security Protocols via Translation to Networks of Automata
-
Report 998 of ICS PAS, Warsaw
-
Kurkowski, M., Penczek, W.: SAT-based Verification of Security Protocols via Translation to Networks of Automata. Report 998 of ICS PAS, Warsaw, http ://www.imi.aj d.czest.pl/pub/report_kp_07.zip (2007)
-
(2007)
-
-
Kurkowski, M.1
Penczek, W.2
-
21
-
-
0342658605
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
-
Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
Lowe, G.: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
23
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6(1-2), 53-84 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 53-84
-
-
Lowe, G.1
-
25
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 13-131 (1996)
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 13-131
-
-
Meadows, C.1
-
26
-
-
0030705405
-
Automated analysis of cryptographic protocols using murφ
-
IEEE Computer Society Press, Los Alamitos
-
Mitchell, M., Mitchell, J.C., Stern, U.: Automated analysis of cryptographic protocols using murφ, In: Proc. of the 1997 IEEE Symposium on Security and Privacy, pp. 141-151. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
Proc. of the 1997 IEEE Symposium on Security and Privacy
, pp. 141-151
-
-
Mitchell, M.1
Mitchell, J.C.2
Stern, U.3
-
27
-
-
0018048246
-
Using Encryption for Authentication in large networks of computers
-
Needham, R., Schroeder, M.: Using Encryption for Authentication in large networks of computers. Communications of the ACM 21(12), 993-999 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
28
-
-
33747035982
-
Using the NUSMV model checker to verify the Kerberos Protocol
-
Panti, M., Spalazzi, L., Tacconi, S.: Using the NUSMV model checker to verify the Kerberos Protocol. In: Proc. of the Third Collaborative Technologies Symposium (CTS-02), pp. 27-31 (2002)
-
(2002)
Proc. of the Third Collaborative Technologies Symposium (CTS-02)
, pp. 27-31
-
-
Panti, M.1
Spalazzi, L.2
Tacconi, S.3
-
30
-
-
33645312974
-
SAT-based reachability checking for timed automata with diagonal constraints
-
Zbrzezny, A.: SAT-based reachability checking for timed automata with diagonal constraints. Fundamenta Informaticae 67(1-3), 303-322 (2005)
-
(2005)
Fundamenta Informaticae
, vol.67
, Issue.1-3
, pp. 303-322
-
-
Zbrzezny, A.1
|