-
1
-
-
84957872542
-
Reasoning about cryptographic protocols in the spi calculus
-
Proceedings of CONCUR'97
-
M. Abadi and A. D. Gordon. Reasoning about cryptographic protocols in the spi calculus. In Proceedings of CONCUR'97, pages 59-73. Lecture Notes in Computer Science 1243, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1243
, pp. 59-73
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
84944050367
-
Probabilistic Information Flow in a Process Algebra
-
12th Int. Conference on Concurrency Theory (CONCUR'01), Aalborg, Denmark, August
-
A. Aldini. Probabilistic Information Flow in a Process Algebra. In 12th Int. Conference on Concurrency Theory (CONCUR'01), Springer LNCS 2154:152-168, Aalborg, Denmark, August 2001.
-
(2001)
Springer LNCS
, vol.2154
, pp. 152-168
-
-
Aldini, A.1
-
5
-
-
0032670195
-
Authentication via localized names
-
IEEE press
-
C. Bodei, P. Degano, R. Focardi, and C. Priami. Authentication via localized names. In Proceedings of CSFW'99, pages 98-110. IEEE press, 1999.
-
(1999)
Proceedings of CSFW'99
, pp. 98-110
-
-
Bodei, C.1
Degano, P.2
Focardi, R.3
Priami, C.4
-
7
-
-
35048849200
-
Non-interference Proof Techniques for the Analysis of Cryptographic Protocols
-
April 5-6, Warsaw, Poland
-
M. Bugliesi, A. Ceccato, S. Rossi. Non-interference Proof Techniques for the Analysis of Cryptographic Protocols. In Proceedings of 2003 IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS'03), April 5-6, 2003, Warsaw, Poland.
-
(2003)
Proceedings of 2003 IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS'03)
-
-
Bugliesi, M.1
Ceccato, A.2
Rossi, S.3
-
8
-
-
35048847727
-
Context-Sensitive Equivalences for Non-interference based Protocol Analysis
-
Proc. of the 14th International Symposium on Fundamentals of Computation Theory, FCT 2003, Springer-Verlag
-
M. Bugliesi, A. Ceccato, and S. Rossi. Context-Sensitive Equivalences for Non-interference based Protocol Analysis. In Proc. of the 14th International Symposium on Fundamentals of Computation Theory, FCT 2003, LNCS 2751, pag. 364-375, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2751
, pp. 364-375
-
-
Bugliesi, M.1
Ceccato, A.2
Rossi, S.3
-
13
-
-
0032659620
-
CVS: A compiler for the analysis of cryptographic protocols
-
IEEE press
-
A. Durante, R. Focardi, and R. Gorrieri. CVS: A compiler for the analysis of cryptographic protocols. In Proceedings of CSFW'99, pages 203-212. IEEE press, 1999.
-
(1999)
Proceedings of CSFW'99
, pp. 203-212
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
14
-
-
35048902864
-
CVS at Work: A Report on new Failures upon some Cryptographic Protocols
-
Procs. International Workshop Mathematical Methods, Models and Architectures for Computer Networks Security, Springer, St. Petersburg, Russia
-
A. Durante, R. Focardi, and R. Gorrieri. CVS at Work: A Report on new Failures upon some Cryptographic Protocols. In Procs. International Workshop Mathematical Methods, Models and Architectures for Computer Networks Security, LNCS 2052, 287-299, Springer, St. Petersburg, Russia, 2001.
-
(2001)
LNCS
, vol.2052
, pp. 287-299
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
15
-
-
0039926997
-
A compiler for analysing cryptographic protocols using non-interference
-
October
-
A. Durante, R. Focardi, and R. Gorrieri. A compiler for analysing cryptographic protocols using non-interference. ACM Transactions on Software Engineering and Methodology (TOSEM), 9(4):488-528, October 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.9
, Issue.4
, pp. 488-528
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
17
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1994/1995.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
18
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9):550-571, 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
19
-
-
84988393004
-
Classification of Security Properties. Part I: Information Flow
-
Foundations of Security Analysis and Design (R. Focardi, R. Gorrieri eds), Springer
-
R. Focardi, R. Gorrieri. Classification of Security Properties. Part I: Information Flow, in Foundations of Security Analysis and Design (R. Focardi, R. Gorrieri eds), LNCS 2171, 331-396, Springer, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
20
-
-
0037421091
-
A Comparison of Three Authentication Properties
-
January Elsevier Science
-
R. Focardi, R. Gorrieri, and F. Martinelli. A Comparison of Three Authentication Properties. Theoretical Computer Science, Volume 291(3), Pages 285-327, January 2003, Elsevier Science.
-
(2003)
Theoretical Computer Science
, vol.291
, Issue.3
, pp. 285-327
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
22
-
-
26844480899
-
Message authentication through non-interference
-
Proceedings of 8th International Conference in Algebraic Methodology and Software Technology (AMAST 2000)
-
R. Focardi, R. Gorrieri, and F. Martinelli. Message authentication through non-interference. In Proceedings of 8th International Conference in Algebraic Methodology and Software Technology (AMAST 2000), pages 258-272. Springer Lecture Notes in Computer Science 1816, 2000.
-
(2000)
Springer Lecture Notes in Computer Science
, vol.1816
, pp. 258-272
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
23
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
proceedings of 27th International Colloquium on Automata, Languages and Programming (ICALP'00), (U. Montanari, ed.), July
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In proceedings of 27th International Colloquium on Automata, Languages and Programming (ICALP'00), (U. Montanari, ed.), pages 354-372. Lecture Notes in Computer Science 1853, July 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
24
-
-
1442267745
-
Secrecy in security protocols as non-interference
-
Workshop on secure architectures and information flow
-
R. Focardi, R. Gorrieri, and F. Martinelli. Secrecy in security protocols as non-interference. Workshop on secure architectures and information flow, ENTCS 32, 2000.
-
(2000)
ENTCS
, vol.32
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
25
-
-
84958046259
-
A uniform approach for the definition of security properties
-
Proceedings of World Congress on Formal Methods (FM'99), Springer
-
R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proceedings of World Congress on Formal Methods (FM'99), pages 794-813. Springer, Lecture Notes in Computer Science 1708, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, F.2
-
28
-
-
19144370194
-
On the verification of cryptographic protocols - A tale of two committees
-
Workshop on secure architectures and information flow
-
D. Gollman. On the verification of cryptographic protocols - a tale of two committees. In Workshop on secure architectures and information flow, volume 32 of ENTCS, 2000.
-
(2000)
ENTCS
, vol.32
-
-
Gollman, D.1
-
29
-
-
35248873844
-
A Simple Language for Real-Time Cryptographic Protocol Analysis
-
Proceedings of 12th European Symposium on Programming, (ESOP 2003), April
-
R. Gorrieri, E. Locatelli, F. Martinelli. A Simple Language for Real-Time Cryptographic Protocol Analysis. In Proceedings of 12th European Symposium on Programming, (ESOP 2003), Springer LNCS 2618, pages 114-128, April 2003.
-
(2003)
Springer LNCS
, vol.2618
, pp. 114-128
-
-
Gorrieri, R.1
Locatelli, E.2
Martinelli, F.3
-
30
-
-
35048903801
-
Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols
-
procs. 28th International Symposium on Mathematical Foundations of Computer Science (MFCS03), Springer, Bratislava (SK), August
-
R. Gorrieri, F. Martinelli. Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols. In procs. 28th International Symposium on Mathematical Foundations of Computer Science (MFCS03), LNCS 2747, 46-67, Springer, Bratislava (SK), August 2003.
-
(2003)
LNCS
, vol.2747
, pp. 46-67
-
-
Gorrieri, R.1
Martinelli, F.2
-
32
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proceedings of TACAS'96
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS'96, pages 146-166. Lecture Notes in Computer Science 1055, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 146-166
-
-
Lowe, G.1
-
35
-
-
0037209815
-
Analysis of security protocols as open systems
-
F. Martinelli. Analysis of security protocols as open systems. Theoretical Computer Science 290(1): 1057-1106 (2003)
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 1057-1106
-
-
Martinelli, F.1
-
36
-
-
0000544858
-
Languages for description and analysis of authentication protocols
-
World Scientific
-
F. Martinelli. Languages for description and analysis of authentication protocols. In Proceedings of ICTCS'98, pages 304-315. World Scientific, 1998.
-
(1998)
Proceedings of ICTCS'98
, pp. 304-315
-
-
Martinelli, F.1
-
37
-
-
0031645024
-
Partial model checking and theorem proving for ensuring security properties
-
IEEE press
-
F. Martinelli. Partial model checking and theorem proving for ensuring security properties. In Proceedings of CSFW'98, pages 44-52. IEEE press, 1998.
-
(1998)
Proceedings of CSFW'98
, pp. 44-52
-
-
Martinelli, F.1
-
39
-
-
0032646572
-
Process algebra and non-interference
-
IEEE press
-
P. Y. A. Ryan and S. Schneider. Process algebra and non-interference. In Proceedings of CSFW'99, pages 214-227. IEEE press, 1999.
-
(1999)
Proceedings of CSFW'99
, pp. 214-227
-
-
Ryan, P.Y.A.1
Schneider, S.2
-
41
-
-
0031633214
-
Formal analysis of a non-repudiation protocol
-
IEEE Press
-
S. Schneider. Formal analysis of a non-repudiation protocol. In Proceedings of CSFW'98, pages 54-65. IEEE Press, 1998.
-
(1998)
Proceedings of CSFW'
, vol.98
, pp. 54-65
-
-
Schneider, S.1
-
43
-
-
0003777431
-
-
Addison-Wesley
-
P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. The Modelling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley, 2001.
-
(2001)
The Modelling and Analysis of Security Protocols: The CSP Approach
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
|