-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi, Secrecy by typing in security protocols, JACM 46(5) (1999), 749-786.
-
(1999)
JACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet, Secrecy types for asymmetric communication, Theor. Comput. Sci. 298(3) (2003), 387-415.
-
(2003)
Theor. Comput. Sci
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
0037432692
-
Secrecy types for asymmetric communication
-
M. Abadi and B. Blanchet, Secrecy types for asymmetric communication, Theoretical Computer Science 298(3) (2003), 387-415.
-
(2003)
Theoretical Computer Science
, vol.298
, Issue.3
, pp. 387-415
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
84957795309
-
Private authentication
-
Proceedings of the 2002 Workshop on Privacy Enhancing Technologies, Springer-Verlag
-
M. Abadi and C. Fournet, Private authentication, in: Proceedings of the 2002 Workshop on Privacy Enhancing Technologies, LNCS, vol. 2482, Springer-Verlag, 2003, pp. 27-40.
-
(2003)
LNCS
, vol.2482
, pp. 27-40
-
-
Abadi, M.1
Fournet, C.2
-
5
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A.D. Gordon, A calculus for cryptographic protocols: The spi calculus, Information and Computation 148(1) (1999), 1-70.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering 22(1) (1996), 6-15.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
8
-
-
84942246406
-
Automatic validation of protocol narration
-
IEEE Computer Society Press
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson and H. Riis Nielson, Automatic validation of protocol narration, in: Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03), IEEE Computer Society Press, 2003, pp. 126-140.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03)
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Riis Nielson, H.5
-
9
-
-
85039117324
-
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson and H. Riis Nielson, Control flow analysis can find new flaws too, in: Proceedings of the Workshop on Issues on the Theory of Security (WITS'04), ENTCS, Elsevier, 2004.
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson and H. Riis Nielson, Control flow analysis can find new flaws too, in: Proceedings of the Workshop on Issues on the Theory of Security (WITS'04), ENTCS, Elsevier, 2004.
-
-
-
-
10
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
Proceedings of ICALP 01, Springer-Verlag
-
M. Boreale, Symbolic trace analysis of cryptographic protocols, in: Proceedings of ICALP 01, LNCS, vol. 2076, Springer-Verlag, 2001, pp. 667-681.
-
(2001)
LNCS
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
12
-
-
35248816980
-
Principles for entity authentication
-
Proceedings of 5th International Conference Perspectives of System Informatics PSI 2003, SpringerVerlag
-
M. Bugliesi, R. Focardi and M. Maffei, Principles for entity authentication, in: Proceedings of 5th International Conference Perspectives of System Informatics (PSI 2003), LNCS, vol. 2890, SpringerVerlag, 2003, pp. 294-307.
-
(2003)
LNCS
, vol.2890
, pp. 294-307
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
13
-
-
20444443229
-
Authenticity by tagging and typing
-
ACM Press, New York, NY, USA
-
M. Bugliesi, R. Focardi and M. Maffei, Authenticity by tagging and typing, in: FMSE '04: Proceedings of the 2004 ACM workshop on Formal methods in security engineering, ACM Press, New York, NY, USA, 2004, pp. 1-12.
-
(2004)
FMSE '04: Proceedings of the 2004 ACM workshop on Formal methods in security engineering
, pp. 1-12
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
14
-
-
21144444143
-
Compositional analysis of authentication protocols
-
Proceedings of European Symposium on Programming ESOP 2004, Springer-Verlag
-
M. Bugliesi, R. Focardi and M. Maffei, Compositional analysis of authentication protocols, in: Proceedings of European Symposium on Programming (ESOP 2004), LNCS, vol. 2986, Springer-Verlag, 2004, pp. 140-154.
-
(2004)
LNCS
, vol.2986
, pp. 140-154
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
16
-
-
34548864135
-
A derivation system for security protocols and its logical formalization
-
A. Datta, A. Derek, J.C. Mitchell and D. Pavlovic, A derivation system for security protocols and its logical formalization, in: CSFW, 2003, pp. 109-125.
-
(2003)
CSFW
, pp. 109-125
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
17
-
-
2642548302
-
Secure protocol composition
-
New York, NY, USA
-
A. Datta, A. Derek, J.C. Mitchell and D. Pavlovic, Secure protocol composition, in: FASE '03: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York, NY, USA, 2003, pp. 11-23.
-
(2003)
FASE '03: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, ACM Press
, pp. 11-23
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
18
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J. Mitchell and D. Pavlovic, A compositional logic for proving security properties of protocols, Journal of Computer Security 11(4) (2004), 677-721.
-
(2004)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.2
Pavlovic, D.3
-
19
-
-
34548836858
-
Inferring authentication tags
-
New York, NY, USA
-
R. Focardi, M. Maffei and F. Placella, Inferring authentication tags, in: WITS '05: Proceedings of the 2005 Workshop on Issues in the Theory of Security, ACM Press, New York, NY, USA, 2005, pp. 41-49.
-
(2005)
WITS '05: Proceedings of the 2005 Workshop on Issues in the Theory of Security, ACM Press
, pp. 41-49
-
-
Focardi, R.1
Maffei, M.2
Placella, F.3
-
20
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. Gordon and A. Jeffrey, Authenticity by typing for security protocols, Journal of Computer Security 11(4) (2004), 451-519.
-
(2004)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 451-519
-
-
Gordon, A.1
Jeffrey, A.2
-
21
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. Gordon and A. Jeffrey, Types and effects for asymmetric cryptographic protocols, Journal of Computer Security 12(3/4) (2004), 435-484.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.1
Jeffrey, A.2
-
22
-
-
27244444891
-
Secrecy despite compromise: Types, cryptography, and the pi-calculus
-
Springer-Verlag
-
A. Gordon, and A. Jeffrey, Secrecy despite compromise: types, cryptography, and the pi-calculus, in: Proceedings of Concur 2005, Springer-Verlag, 2005, pp. 186-201.
-
(2005)
Proceedings of Concur 2005
, pp. 186-201
-
-
Gordon, A.1
Jeffrey, A.2
-
23
-
-
0037076868
-
Authentication tests and the structure of bundles
-
J.D. Guttman and F.J. Thayer, Authentication tests and the structure of bundles, Theoretical Computer Science 283(2) (2002), 333-380.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Thayer, F.J.2
-
24
-
-
35048867881
-
Trust management in strand spaces: A rely-guarantee method
-
Proceedings of European Symposium on Programming ESOP 2004, Springer-Verlag
-
J.D. Guttman, F.J. Thayer, J.A. Carlson, J.C. Herzog, J.D. Ramsdell and B.T. Sniffen, Trust management in strand spaces: a rely-guarantee method, in: Proceedings of European Symposium on Programming (ESOP 2004), LNCS, vol. 2986, Springer-Verlag, 2004, pp. 325-339.
-
(2004)
LNCS
, vol.2986
, pp. 325-339
-
-
Guttman, J.D.1
Thayer, F.J.2
Carlson, J.A.3
Herzog, J.C.4
Ramsdell, J.D.5
Sniffen, B.T.6
-
25
-
-
0033714403
-
Protocol independence through, disjoint encryption
-
IEEE Computer Society Press
-
J.D. Guttman and F.J. Thayer, Protocol independence through, disjoint encryption, in: Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW'00), IEEE Computer Society Press, 2000, pp. 24-34.
-
(2000)
Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW'00)
, pp. 24-34
-
-
Guttman, J.D.1
Thayer, F.J.2
-
27
-
-
0033683193
-
How to prevent type flaw attacks on security protocols
-
IEEE Computer Society Press
-
J. Heather, G. Lowe and S. Schneider, How to prevent type flaw attacks on security protocols, in: Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW'OO), IEEE Computer Society Press, 2000, pp. 255-268.
-
(2000)
Proceedings of 13th IEEE Computer Security Foundations Workshop (CSFW'OO)
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
28
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems TACAS, SpringerVerlag
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Tools and Algorithms for the Construction and Analysis of Systems (TACAS), LNCS, vol. 1055, SpringerVerlag, 1996, pp. 147-166.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
30
-
-
20144369157
-
A family of attacks upon authentication protocols
-
Technical Report 1997/5, Department of Mathematics and Computer Science, University of Leicester
-
G. Lowe, A family of attacks upon authentication protocols, Technical Report 1997/5, Department of Mathematics and Computer Science, University of Leicester, 1997.
-
(1997)
-
-
Lowe, G.1
-
31
-
-
27844540827
-
Formal specification and analysis of the group domain of intrepretation protocol using npatrl and the nrl protocol analyzer
-
C. Meadows and P. Syverson, Formal specification and analysis of the group domain of intrepretation protocol using npatrl and the nrl protocol analyzer, Journal of Computer Security 12(6) (2004), 893-931.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.6
, pp. 893-931
-
-
Meadows, C.1
Syverson, P.2
-
32
-
-
84955583138
-
Open issues in formal methods for cryptographic protocol analysis
-
C. Meadows, Open issues in formal methods for cryptographic protocol analysis, LNCS, vol. 2052 (2001), pp. 21-36.
-
(2001)
LNCS
, vol.2052
, pp. 21-36
-
-
Meadows, C.1
-
34
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
J. Thayer, J. Herzog and J. Guttman, Strand spaces: Proving security protocols correct, Journal of Computer Security 7(2/3) (1999), 191-230.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Thayer, J.1
Herzog, J.2
Guttman, J.3
-
35
-
-
0002508587
-
A lesson on authentication protocol design
-
T.Y.C. Woo and S.S. Lam, A lesson on authentication protocol design. Operating Systems Review, 28(3) (1994), 24-37.
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 24-37
-
-
Woo, T.Y.C.1
Lam, S.S.2
|