-
2
-
-
26444497860
-
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.C. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganó, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In Proc. of 17th International Conference on Computer Aided Verification (CAV'05), 3576 of LNCS, pages 281-285. Springer-Verlag, 2005.
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.C. Heám, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganó, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. In Proc. of 17th International Conference on Computer Aided Verification (CAV'05), volume 3576 of LNCS, pages 281-285. Springer-Verlag, 2005.
-
-
-
-
3
-
-
22944445210
-
SATMC: A SAT-based model checker for security protocols
-
Proc. of the 9th European Conference on Logics in Artificial Intelligence JELIA '04, of, Springer
-
A. Armando and L. Compagna. SATMC: A SAT-based model checker for security protocols. In Proc. of the 9th European Conference on Logics in Artificial Intelligence (JELIA '04), volume 3229 of LNCS, pages 730-733. Springer, 2004.
-
(2004)
LNCS
, vol.3229
, pp. 730-733
-
-
Armando, A.1
Compagna, L.2
-
4
-
-
14044277509
-
An optimized intruder model for SAT-based model-checking of security protocols
-
A. Armando and L. Compagna. An optimized intruder model for SAT-based model-checking of security protocols. ENTCS, 125(1):91-108, 2005.
-
(2005)
ENTCS
, vol.125
, Issue.1
, pp. 91-108
-
-
Armando, A.1
Compagna, L.2
-
5
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
D. A. Basin, S. Mödersheim, and Luca Viganò. OFMC: A symbolic model checker for security protocols. International Journal of Information Security, 4(3):181-208, 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.A.1
Mödersheim, S.2
Viganò, L.3
-
6
-
-
0003334513
-
New generation of UPPAAL
-
J. Bengtsson, K. G. Larsen, F. Larsson, P. Pettersson, W. Yi, and C. Weise. New generation of UPPAAL. In Proc. of the Int. Workshop on Software Tools for Technology Transfer, 1998.
-
(1998)
Proc. of the Int. Workshop on Software Tools for Technology Transfer
-
-
Bengtsson, J.1
Larsen, K.G.2
Larsson, F.3
Pettersson, P.4
Yi, W.5
Weise, C.6
-
8
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Trans. Comput. Syst., 8(1): 18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
9
-
-
0003568551
-
A survey of authentication protocol literature
-
Technical Report 1.0
-
J. A. Clark and J. L. Jacob. A survey of authentication protocol literature. Technical Report 1.0, 1997.
-
(1997)
-
-
Clark, J.A.1
Jacob, J.L.2
-
10
-
-
20444436469
-
Timed model checking of security protocols
-
ACM
-
R. Corin, S. Etalle, P. H. Hartel, and A. Mader. Timed model checking of security protocols. In Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering (FMSE'04), pages 23-32. ACM, 2004.
-
(2004)
Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering (FMSE'04)
, pp. 23-32
-
-
Corin, R.1
Etalle, S.2
Hartel, P.H.3
Mader, A.4
-
11
-
-
40149092144
-
The tool KRONOS
-
Hybrid Systems III, of, Springer-Verlag
-
C. Daws, A. Olivero, S. Tripakis, and S. Yovine. The tool KRONOS. In Hybrid Systems III, volume 1066 of LNCS, pages 208-219. Springer-Verlag, 1995.
-
(1995)
LNCS
, vol.1066
, pp. 208-219
-
-
Daws, C.1
Olivero, A.2
Tripakis, S.3
Yovine, S.4
-
12
-
-
35048864876
-
Automatic verification of time sensitive cryptographic protocols
-
Proc. of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS'04, of, Springer
-
G. Delzanno and P. Ganty. Automatic verification of time sensitive cryptographic protocols. In Proc. of the 10th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'04), volume 2988 of LNCS, pages 342-356. Springer, 2004.
-
(2004)
LNCS
, vol.2988
, pp. 342-356
-
-
Delzanno, G.1
Ganty, P.2
-
13
-
-
35248826437
-
VerICS: A tool for verifying timed automata and Estelle specifications
-
Proc. of the 9th Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems TACAS'03, of, Springer-Verlag
-
P. Dembiński, A. Janowska, P. Janowski, W. Penczek, A. Półrola, M. Szreter, B. Woźna, and A. Zbrzezny. VerICS: A tool for verifying timed automata and Estelle specifications. In Proc. of the 9th Int. Conf. on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'03), volume 2619 of LNCS, pages 278-283. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2619
, pp. 278-283
-
-
Dembiński, P.1
Janowska, A.2
Janowski, P.3
Penczek, W.4
Półrola, A.5
Szreter, M.6
Woźna, B.7
Zbrzezny, A.8
-
14
-
-
34548601223
-
From specification languages to timed automata
-
Humboldt University
-
A. Doroś, A. Janowska, and P. Janowski. From specification languages to timed automata. In Proc. of the Int. Workshop on Concurrency, Specification and Programming (CS&P'02), volume 161(1) of Informatik-Berichte, pages 117-128. Humboldt University, 2002.
-
(2002)
Proc. of the Int. Workshop on Concurrency, Specification and Programming (CS&P'02), volume 161(1) of Informatik-Berichte
, pp. 117-128
-
-
Doroś, A.1
Janowska, A.2
Janowski, P.3
-
15
-
-
84944070422
-
Analysing time dependent security properties in CSP using PVS
-
Proc. of the 6th European Symposium on Research in Computer Security ESORICS'00, of, Springer
-
N. Evans and S. Schneider. Analysing time dependent security properties in CSP using PVS. In Proc. of the 6th European Symposium on Research in Computer Security (ESORICS'00), volume 1895 of LNCS, pages 222-237. Springer, 2000.
-
(2000)
LNCS
, vol.1895
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
16
-
-
35248873844
-
A simple language for real-time cryptographic protocol analysis
-
Proc. of the 12th European Symposium on Programming ESOP'03, of, Springer
-
R. Gorrieri, E. Locatelli, and F. Martinelli. A simple language for real-time cryptographic protocol analysis. In Proc. of the 12th European Symposium on Programming (ESOP'03), volume 2618 of LNCS, pages 114-128. Springer, 2003.
-
(2003)
LNCS
, vol.2618
, pp. 114-128
-
-
Gorrieri, R.1
Locatelli, E.2
Martinelli, F.3
-
17
-
-
34548660001
-
Verifying timed properties of security protocols
-
Technical Report 991, ICS PAS, Ordona 21, 01-237 Warsaw, March
-
G. Jakubowska and W. Penczek. Verifying timed properties of security protocols. Technical Report 991, ICS PAS, Ordona 21, 01-237 Warsaw, March 2006.
-
(2006)
-
-
Jakubowska, G.1
Penczek, W.2
-
19
-
-
34548609248
-
Verifying security protocols with timestamps via translation to timed automata
-
Warsaw University
-
G. Jakubowska, W. Penczek, and M. Srebrny. Verifying security protocols with timestamps via translation to timed automata. In Proc. of the International Workshop on Concurrency, Specification and Programming (CS&P'05), pages 100-115. Warsaw University, 2005.
-
(2005)
Proc. of the International Workshop on Concurrency, Specification and Programming (CS&P'05)
, pp. 100-115
-
-
Jakubowska, G.1
Penczek, W.2
Srebrny, M.3
-
20
-
-
34548632468
-
Sat-based verification of security protocols via translation to networks of automata
-
MoChart IV, of, Springer-Verlag
-
M. Kurkowski, W. Penczek, and A. Zbrzezny. Sat-based verification of security protocols via translation to networks of automata. In MoChart IV, volume 4428 of LNAI, pages 146-165. Springer-Verlag, 2007.
-
(2007)
LNAI
, vol.4428
, pp. 146-165
-
-
Kurkowski, M.1
Penczek, W.2
Zbrzezny, A.3
-
21
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3): 131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
22
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6(1-2):53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 53-84
-
-
Lowe, G.1
-
24
-
-
34548609559
-
Using the NuSMV model checker to verify the kerberos protocol
-
Society for Computer Simulation
-
M. Panti, L. Spalazzi, and S. Tacconi. Using the NuSMV model checker to verify the kerberos protocol. In Simulation Series, volume 34, pages 230-236. Society for Computer Simulation, 2002.
-
(2002)
Simulation Series
, vol.34
, pp. 230-236
-
-
Panti, M.1
Spalazzi, L.2
Tacconi, S.3
|