-
1
-
-
19144369108
-
Programming Satan's computer. Computer Science Today: 426-440
-
R. Anderson, and R. Needham. Programming Satan's computer. Computer Science Today: 426-440, LNCS 1000, 1995.
-
(1995)
LNCS
, vol.1000
-
-
Anderson, R.1
Needham, R.2
-
2
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
G. Bella and L. C. Paulson. Kerberos version IV: inductive analysis of the secrecy goals. ESORICS '98: 361-375, 1998.
-
(1998)
ESORICS '98
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
3
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Trans. on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Trans. on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. CSFW '01: 82-96, 2001.
-
(2001)
CSFW '01
, pp. 82-96
-
-
Blanchet, B.1
-
5
-
-
84888233924
-
Beyond Parameterized Verification
-
M. Bozzano and G. Delzanno. Beyond Parameterized Verification. TACAS '02, LNCS 2280: 221-235, 2002.
-
(2002)
TACAS '02, LNCS
, vol.2280
, pp. 221-235
-
-
Bozzano, M.1
Delzanno, G.2
-
6
-
-
1442316806
-
Pattern-based Abstraction for Verifying Secrecy in Protocols
-
L. Bozga, Y. Lakhnech, and M. Périn. Pattern-based Abstraction for Verifying Secrecy in Protocols. TACAS '03, LNCS 2619: 299-314, 2003.
-
(2003)
TACAS '03, LNCS
, vol.2619
, pp. 299-314
-
-
Bozga, L.1
Lakhnech, Y.2
Périn, M.3
-
7
-
-
0032671775
-
A meta-notation for Protocol Analysis
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. A meta-notation for Protocol Analysis. CSFW '99: 55-69, 1999.
-
(1999)
CSFW '99
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
8
-
-
0033718532
-
A First-Order Verifier for Cryptographic Protocols
-
E. Cohen. TAPS: A First-Order Verifier for Cryptographic Protocols. CSFW '00: 144-158, 2000.
-
(2000)
CSFW '00
, pp. 144-158
-
-
Cohen Taps, E.1
-
9
-
-
84944070422
-
Analysing Time Dependent Security Properties in CSP Using PVS
-
N. Evans and S. Schneider. Analysing Time Dependent Security Properties in CSP Using PVS. ESORICS '00, LNCS 1895: 222-237, 2000.
-
(2000)
ESORICS '00, LNCS
, vol.1895
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
10
-
-
84937389998
-
Rewriting for Cryptographic Protocol Verification
-
T. Genet and F. Klay. Rewriting for Cryptographic Protocol Verification. CADE '00, LNCS 1831: 271-290, 2000.
-
(2000)
CADE '00, LNCS
, vol.1831
, pp. 271-290
-
-
Genet, T.1
Klay, F.2
-
11
-
-
20144369157
-
A Family of Attacks upon Authentication Protocols
-
University of Leicester
-
G. Lowe. A Family of Attacks upon Authentication Protocols. Technical Report 1997/5, University of Leicester, 1997.
-
(1997)
Technical Report 1997/5
-
-
Lowe, G.1
-
12
-
-
0030708255
-
A Hierarchy of Authentication Specifications
-
G. Lowe. A Hierarchy of Authentication Specifications. CSFW '97: 31-44, 1997.
-
(1997)
CSFW '97
, pp. 31-44
-
-
Lowe, G.1
-
13
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: A compiler for the analysis of security protocols. CSFW '97: 18-30, 1997.
-
(1997)
CSFW '
, vol.97
, pp. 18-30
-
-
Lowe, G.1
-
14
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
G. Lowe. Towards a completeness result for model checking of security protocols. J. of Computer Security, 7(2-3):89-146, 1998.
-
(1998)
J. of Computer Security
, vol.7
, Issue.2-3
, pp. 89-146
-
-
Lowe, G.1
-
16
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: An overview. J. of Logic Programming, 26(2):113-131, 1996.
-
(1996)
J. of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
17
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. CCS '01: 166-175, 2001.
-
(2001)
CCS '01
, pp. 166-175
-
-
Millen, J.1
Shmatikov, V.2
-
18
-
-
0033344294
-
Proving Security Protocols with Model Checkers by Data Independence Techniques
-
A. W. Roscoe and P. J. Broadfoot. Proving Security Protocols with Model Checkers by Data Independence Techniques. J. of Computer Security, 7(2,3):147-190, 1999.
-
(1999)
J. of Computer Security
, vol.7
, Issue.2-3
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
-
19
-
-
0032678887
-
A New Efficient Automatic Checker for Security Protocol Analysis
-
D. X. Song. Athena. A New Efficient Automatic Checker for Security Protocol Analysis. CSFW '99: 192-202, 1999.
-
(1999)
CSFW '99
, pp. 192-202
-
-
Song Athena, D.X.1
-
20
-
-
35048818908
-
-
The MSR(C) home page
-
The MSR(C) home page: http://www.disi.unige.it/person/DelzannoG/MSR/
-
-
-
|