-
1
-
-
84982909952
-
Secure implementation of channel abstractions
-
M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. In LICS, pages 105-116, 1998.
-
(1998)
LICS
, pp. 105-116
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
2
-
-
26444497860
-
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
-
Springer-Verlag, Available at
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Heám, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05). Springer-Verlag, 2005. Available at www. avispa-project.org.
-
(2005)
Proceedings of the 17th International Conference on Computer Aided Verification (CAV'05)
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Hankes Drielsma, P.7
Heám, P.-C.8
Mantovani, J.9
Mödersheim, S.10
von Oheimb, D.11
Rusinowitch, M.12
Santiago, J.13
Turuani, M.14
Viganò, L.15
Vigneron, L.16
-
5
-
-
84961379291
-
Lazy infinite-state analysis of security protocols
-
R. Baumgart, editor, Secure Networking -CQRE (Secure)'99, Springer-Verlag
-
D. Basin. Lazy infinite-state analysis of security protocols. In R. Baumgart, editor, Secure Networking -CQRE (Secure)'99, LNCS 1740, pages 30-42. Springer-Verlag, 1999.
-
(1740)
LNCS
, pp. 30-42
-
-
Basin, D.1
-
6
-
-
33646262130
-
Algebraic intruder deductions
-
G. Sutcliffe and A. Voronkov, editors, Springer
-
D. Basin, S. Mödersheim, and L. Viganò. Algebraic intruder deductions. In G. Sutcliffe and A. Voronkov, editors, Proceedings of LPAR'05, LNAI3835, pages 549-564. Springer, 2005.
-
(2005)
Proceedings of LPAR'05, LNAI3835
, pp. 549-564
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
7
-
-
84944319371
-
Symbolic Model Checking without BDDs
-
Proceedings of TACAS'99, Springer-Verlag
-
A. Biere, A. Cimatti, E. Clarke, and Y. Zhu. Symbolic Model Checking without BDDs. In Proceedings of TACAS'99, LNCS 1579, pages 193-207. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1579
, pp. 193-207
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.3
Zhu, Y.4
-
8
-
-
0032671775
-
A meta-notation for protocol analysis
-
IEEE Computer Society Press
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. A meta-notation for protocol analysis. In Proceedings of the 12th IEEE Computer Security Foundations Workshop: CSFW'99, pages 55-69. IEEE Computer Society Press, 1999.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop: CSFW'99
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
9
-
-
0041967380
-
An NP Decision Procedure for Protocol Insecurity with XOR
-
Available at
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In Proceedings of the Logic In Computer Science Conference, LICS'03, pages 261-270, 2003. Available at http://www.avispa-project.org.
-
(2003)
Proceedings of the Logic In Computer Science Conference, LICS'03
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
10
-
-
35048851469
-
-
J. Clark and J. Jacob. A Survey of Authentication Protocol Literature: Version 1.0, 17. Nov. 1997. URL
-
J. Clark and J. Jacob. A Survey of Authentication Protocol Literature: Version 1.0, 17. Nov. 1997. URL: www.cs. york.ac.uk/~jac/papers/drareview.ps.gz.
-
-
-
-
11
-
-
24944569389
-
The finite variant property: How to get rid of some algebraic properties
-
J. Giesl, editor, Proceedings of the 16th International Conference on Rewriting Techniques and Applications RTA '05, of, Nara, Japan, Apr, Springer
-
H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. In J. Giesl, editor, Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA '05), volume 3467 of Lecture Notes in Computer Science, pages 294-307, Nara, Japan, Apr. 2005. Springer.
-
(2005)
Lecture Notes in Computer Science
, vol.3467
, pp. 294-307
-
-
Comon-Lundh, H.1
Delaune, S.2
-
15
-
-
84956860311
-
Compiling and Verifying Security Protocols
-
M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, Springer-Verlag
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and Verifying Security Protocols. In M. Parigot and A. Voronkov, editors, Proceedings of LPAR 2000, LNCS 1955, pages 131-160. Springer-Verlag, 2000.
-
(1955)
LNCS
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
16
-
-
0030232808
-
A calculus for security bootstrapping in distributed systems
-
U. Maurer and P. Schmid. A calculus for security bootstrapping in distributed systems. Journal of Computer Security, 4(1):55-80, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.1
, pp. 55-80
-
-
Maurer, U.1
Schmid, P.2
-
17
-
-
0030084918
-
The NRL Protocol Analyzer: An Overview
-
113-131, See http
-
C. Meadows. The NRL Protocol Analyzer: An Overview. Journal of Logic Programming, 26(2):113-131, 1996. See http://chacs.nrl.navy.mil/projects/ crypto.html.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
-
-
Meadows, C.1
-
19
-
-
84948779843
-
Game analysis of abuse-free contract signing
-
IEEE Computer Society Press, June
-
J. Raskin and S. Kremer. Game analysis of abuse-free contract signing. In 15th IEEE Computer Security Foundations Workshop, pages 206-220. IEEE Computer Society Press, June 2002.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 206-220
-
-
Raskin, J.1
Kremer, S.2
-
20
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
V. Shmatikov and J. C. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 283(2):419-450, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
|