-
3
-
-
0000298407
-
A bisimulation method for cryptographic protocols
-
Winter
-
M. Abadi and A. D. Gordon. A bisimulation method for cryptographic protocols. Nordic Journal of Computing, 5(4):267-303, Winter 1998.
-
(1998)
Nordic Journal of Computing
, vol.5
, Issue.4
, pp. 267-303
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Jan.
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, Jan. 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
C. Palamidessi, editor, CONCUR 2000: Concurrency Theory (11th Int. Conference), Springer Verlag, Aug.
-
R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In C. Palamidessi, editor, CONCUR 2000: Concurrency Theory (11th Int. Conference), volume 1877 of LNCS, pages 380-394. Springer Verlag, Aug. 2000.
-
(2000)
LNCS
, vol.1877
, pp. 380-394
-
-
Amadio, R.M.1
Lugiez, D.2
-
7
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
M. Hermenegildo and G. Puebla, editors, 9th Int. Static Analysis Symposium (SAS'02), Springer Verlag, Sept.
-
B. Blanchet. From secrecy to authenticity in security protocols. In M. Hermenegildo and G. Puebla, editors, 9th Int. Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 342-359. Springer Verlag, Sept. 2002.
-
(2002)
LNCS
, vol.2477
, pp. 342-359
-
-
Blanchet, B.1
-
8
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
May to appear
-
B. Blanchet. Automatic proof of strong secrecy for security protocols. In IEEE Symposium on Security and Privacy, May 2004, to appear.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Blanchet, B.1
-
10
-
-
35248865266
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
P. K. Pandya and J. Radhakrishnan, editors, FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Springer Verlag
-
Y. Chevalier, R. Kuester, M. Rusinowitch, and M. Turani. Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. In P. K. Pandya and J. Radhakrishnan, editors, FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, volume 2914 of LNCS, pages 124-135. Springer Verlag, 2003.
-
(2003)
LNCS
, vol.2914
, pp. 124-135
-
-
Chevalier, Y.1
Kuester, R.2
Rusinowitch, M.3
Turani, M.4
-
11
-
-
0041967380
-
An NP decision procedure for protocol insecurity with xor
-
Y. Chevalier, R. Kuester, M. Rusinowitch, and M. Turani. An NP decision procedure for protocol insecurity with xor. In Proceedings of the 18th Annual IEEE Symposium on Logic In Computer Science (LICS'03), pages 261-270, 2003.
-
(2003)
Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03)
, pp. 261-270
-
-
Chevalier, Y.1
Kuester, R.2
Rusinowitch, M.3
Turani, M.4
-
13
-
-
28144461037
-
-
Technical Report LSV-03-8, Laboratoire Spécification et Vérification, ENS de Cachan, France
-
H. Comon-Lundh and R. Treinen. Easy intruder deductions. Technical Report LSV-03-8, Laboratoire Spécification et Vérification, ENS de Cachan, France, 2003.
-
(2003)
Easy Intruder Deductions
-
-
Comon-Lundh, H.1
Treinen, R.2
-
14
-
-
35048826490
-
-
Technical Report LSV-04-8, Laboratoire Spécification et Vérification, ENS de Cachan, France, April
-
S. Delaune and F. Jacquemard. Narrowing-based constraint solving for the verification of security protocols. Technical Report LSV-04-8, Laboratoire Spécification et Vérification, ENS de Cachan, France, April 2004.
-
(2004)
Narrowing-based Constraint Solving for the Verification of Security Protocols
-
-
Delaune, S.1
Jacquemard, F.2
-
15
-
-
0020720357
-
On the security of public key protocols
-
Mar.
-
D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12): 198-208, Mar. 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
17
-
-
0028385109
-
Three system for cryptographic protocol analysis
-
Spring
-
R. Kemmerer, C. Meadows, and J. Millen. Three system for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, Spring 1994.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
18
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proceedings of the Fifth ACM Conference on Computer and Communications Security, pages 112-121, 1998.
-
(1998)
Proceedings of the Fifth ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
19
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems, Springer Verlag
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of LNCS, pages 147-166. Springer Verlag, 1996.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
20
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
|