-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0037432692
-
Secrecy types for asymmetric communication
-
Proc. 4th International Conference on Foundations of Software Science and Computation Structures FOSSACS, of, Springer-Verlag
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Proc. 4th International Conference on Foundations of Software Science and Computation Structures (FOSSACS), volume 2030 of Lecture Notes in Computer Science, pages 25-41. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2030
, pp. 25-41
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society Press
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96. IEEE Computer Society Press, 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 82-96
-
-
Blanchet, B.1
-
7
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS
-
Advances in Cryptology: CRYPTO '98, of, Springer-Verlag
-
D. Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS. In Advances in Cryptology: CRYPTO '98, volume 1462 of Lecture Notes in Computer Science, pages 1-12. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
8
-
-
24144452823
-
Static validation of security protocols
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. R. Nielson. Static validation of security protocols. Journal of Computer Security, 13(3):347-390, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.R.5
-
9
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
28rd International Colloquium on Automata, Languages and Programming ICALP 2001, Springer-Verlag
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In 28rd International Colloquium on Automata, Languages and Programming (ICALP 2001), Lecture Notes in Computer Science, pages 667-681. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, pp. 667-681
-
-
Boreale, M.1
-
11
-
-
21144444143
-
Compositional analysis of authentication protocols
-
Proc. 13th European Symposium on Programming ESOP, of, Springer-Verlag
-
M. Bugliesi, R. Focardi, and M. Maffei. Compositional analysis of authentication protocols. In Proc. 13th European Symposium on Programming (ESOP), volume 2986 of Lecture Notes in Computer Science, pages 140-154. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2986
, pp. 140-154
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
12
-
-
34548820967
-
-
M. Bugliesi, R. Focardi, and M. Maffei. Dynamic types for authentication, 2007. To appear in Journal of Computer Security.
-
M. Bugliesi, R. Focardi, and M. Maffei. Dynamic types for authentication, 2007. To appear in Journal of Computer Security.
-
-
-
-
13
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
ACM Press
-
P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. 4th Symposium on Principles of Programming Languages (POPL), pages 238-252. ACM Press, 1977.
-
(1977)
Proc. 4th Symposium on Principles of Programming Languages (POPL)
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
15
-
-
84976665942
-
Timestamps in key distribution protocols
-
D. E. Denning and G. M. Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533-536, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
16
-
-
35048899619
-
Searching for shapes in cryptographic protocols
-
Proc. 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS, Springer-Verlag
-
S. Doghmi, J. Guttman, and F. Thayer. Searching for shapes in cryptographic protocols. In Proc. 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Lecture Notes in Computer Science, pages 523-538. Springer-Verlag, 2007.
-
(2007)
Lecture Notes in Computer Science
, pp. 523-538
-
-
Doghmi, S.1
Guttman, J.2
Thayer, F.3
-
18
-
-
35048829696
-
-
L. S. et Vérification. Security protocols open repository. http://www.lsv.ens-cachan.fr/spore/.
-
L. S. et Vérification. Security protocols open repository. http://www.lsv.ens-cachan.fr/spore/.
-
-
-
-
20
-
-
18744402837
-
Millions of .Net Passport accounts put at risk
-
May, Flaw detected by Muhammad Faisal Rauf Danka
-
D. Fisher. Millions of .Net Passport accounts put at risk. eWeek, May 2003. (Flaw detected by Muhammad Faisal Rauf Danka).
-
(2003)
eWeek
-
-
Fisher, D.1
-
21
-
-
24644447402
-
A type discipline for authorization policies
-
Proc. 14th European Symposium on Programming ESOP, Springer-Verlag
-
C. Fournet, A. D. Gordon, and S. Maffeis. A type discipline for authorization policies. In Proc. 14th European Symposium on Programming (ESOP), Lecture Notes in Computer Science, pages 141-156. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 141-156
-
-
Fournet, C.1
Gordon, A.D.2
Maffeis, S.3
-
22
-
-
35048837013
-
Detecting replay attacks by freshness annotations
-
H. Gao, P. Degano, C. Bodei, and H. R. Nielson. Detecting replay attacks by freshness annotations. In WITS '07: Proceedings of the 7th Workshop on Issues in the theory of security, pages 85-100, 2007.
-
(2007)
WITS '07: Proceedings of the 7th Workshop on Issues in the theory of security
, pp. 85-100
-
-
Gao, H.1
Degano, P.2
Bodei, C.3
Nielson, H.R.4
-
23
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3):435-484, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.2
-
24
-
-
27244444891
-
Secrecy despite compromise: Types, cryptography, and the pi-calculus
-
Springer-Verlag
-
A. D. Gordon and A. Jeffrey. Secrecy despite compromise: Types, cryptography, and the pi-calculus. In Proc. 16th International Conference on Concurrency Theory (CONCUR), volume 3653, pages 186-201. Springer-Verlag, 2005.
-
(2005)
Proc. 16th International Conference on Concurrency Theory (CONCUR)
, vol.3653
, pp. 186-201
-
-
Gordon, A.D.1
Jeffrey, A.2
-
25
-
-
24144470036
-
Cryptographic protocol analysis on real c code
-
Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation VMCAI'05, of, Springer-Verlag
-
J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real c code. In Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), volume 3385 of Lecture Notes in Computer Science, pages 363-379. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
26
-
-
35048867881
-
Trust management in strand spaces: A rely-guarantee method
-
Proc. 13th European Symposium on Programming ESOP, of, Springer-Verlag
-
J. Guttman, F. Thayer, J. A. Carlson, J. C. Herzog, J. D. Ramsdell, and B. T. Sniffen. Trust management in strand spaces: a rely-guarantee method. In Proc. 13th European Symposium on Programming (ESOP), volume 2986 of Lecture Notes in Computer Science, pages 325-339. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2986
, pp. 325-339
-
-
Guttman, J.1
Thayer, F.2
Carlson, J.A.3
Herzog, J.C.4
Ramsdell, J.D.5
Sniffen, B.T.6
-
27
-
-
0037076868
-
Authentication tests and the structure of bundles
-
J. D. Guttman and F. J. Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Thayer, F.J.2
-
29
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 12(21):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.12
, Issue.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
33
-
-
0002508587
-
A lesson on authentication protocol design
-
T. Y. C. Woo and S. S. Lam. A lesson on authentication protocol design. Operation Systems Review, 28(3):24-37, 1994.
-
(1994)
Operation Systems Review
, vol.28
, Issue.3
, pp. 24-37
-
-
Woo, T.Y.C.1
Lam, S.S.2
|