-
1
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
January
-
Martín Abadi and Bruno Blanchet. Analyzing security protocols with secrecy types and logic programs. Journal of the ACM, 52(1):102-146, January 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Concur, number
-
Roberto M. Amadio and Denis Lugiez. On the reachability problem in cryptographic protocols. In Concur, number 1877 in LNCS, pages 380-394, 2000.
-
(1877)
LNCS
, pp. 380-394
-
-
Amadio, R.M.1
Lugiez, D.2
-
4
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Foundations of Software Science and Computation Structures, April
-
Bruno Blanchet and Andreas Podelski. Verification of cryptographic protocols: Tagging enforces termination. In Foundations of Software Science and Computation Structures, LNCS, pages 136-152, April 2003.
-
(2003)
LNCS
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
5
-
-
33750241298
-
Universally composable symbolic analysis of mutual authentication and key exchange protocols
-
March
-
Ran Canetti and Jonathan Herzog. Universally composable symbolic analysis of mutual authentication and key exchange protocols. In Proceedings, Theory of Cryptography Conference (TCC), March 2006.
-
(2006)
Proceedings, Theory of Cryptography Conference (TCC)
-
-
Canetti, R.1
Herzog, J.2
-
6
-
-
37148999718
-
-
Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer. Searching for shapes in cryptographic protocols (extended version). URL:http://eprint.iacr. org/2006/435, November 2006.
-
Shaddin F. Doghmi, Joshua D. Guttman, and F. Javier Thayer. Searching for shapes in cryptographic protocols (extended version). URL:http://eprint.iacr. org/2006/435, November 2006.
-
-
-
-
8
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
Nancy Durgin, Patrick Lincoln, John Mitchell, and Andre Scedrov. Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security, 12(2):247-311, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.2
, pp. 247-311
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
9
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
Andrew D. Gordon and Alan Jeffrey. Types and effects for asymmetric cryptographic protocols. Journal of Computer Security, 12(3/4):435-484, 2003.
-
(2003)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.2
-
10
-
-
0037076868
-
Authentication tests and the structure of bundles
-
June
-
Joshua D. Guttman and F. Javier Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, June 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Javier Thayer, F.2
-
11
-
-
37149020169
-
-
Conference version appeared in IEEE Symposium on Security and Privacy, May 2000.
-
Conference version appeared in IEEE Symposium on Security and Privacy, May 2000.
-
-
-
-
12
-
-
12144271120
-
The Diffie-Hellman key-agreement scheme in the strandspace model
-
Asilomar, CA, June, IEEE CS Press
-
Jonathan C. Herzog. The Diffie-Hellman key-agreement scheme in the strandspace model. In 16th Computer Security Foundations Workshop, pages 234-247, Asilomar, CA, June 2003. IEEE CS Press.
-
(2003)
16th Computer Security Foundations Workshop
, pp. 234-247
-
-
Herzog, J.C.1
-
13
-
-
37149004909
-
-
ITU. Message sequence chart (MSC). Recommendation Z.120, 1999.
-
ITU. Message sequence chart (MSC). Recommendation Z.120, 1999.
-
-
-
-
14
-
-
0017996760
-
Time, clocks and the ordering of events in a distributed system
-
Leslie Lamport. Time, clocks and the ordering of events in a distributed system. CACM, 21(7):558-565, 1978.
-
(1978)
CACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
15
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proceeedings of TACAS, of, Springer Verlag
-
Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceeedings of TACAS, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer Verlag, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
17
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Roger Needham and Michael Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
-
-
Needham, R.1
Schroeder, M.2
-
18
-
-
0034950756
-
Relations between secrets: Two formal analyses of the Yahalom protocol
-
Lawrence C. Paulson. Relations between secrets: Two formal analyses of the Yahalom protocol. Journal of Computer Security, 2001.
-
(2001)
Journal of Computer Security
-
-
Paulson, L.C.1
-
19
-
-
0033682447
-
Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols
-
IEEE Computer Society Press, July
-
Adrian Perrig and Dawn Xiaodong Song. Looking for diamonds in the desert: Extending automatic protocol generation to three-party authentication and key agreement protocols. In Proceedings of the 13th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, July 2000.
-
(2000)
Proceedings of the 13th IEEE Computer Security Foundations Workshop
-
-
Perrig, A.1
Xiaodong Song, D.2
-
20
-
-
11944251803
-
Decidability of context-explicit security protocols
-
R. Ramanujam and S. P. Suresh. Decidability of context-explicit security protocols. Journal of Computer Security, 13(1): 135-166, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 135-166
-
-
Ramanujam, R.1
Suresh, S.P.2
-
21
-
-
37149050209
-
-
Preliminary version appeared in WITS '03, Workshop on Issues in the Theory of Security, Warsaw, April 2003.
-
Preliminary version appeared in WITS '03, Workshop on Issues in the Theory of Security, Warsaw, April 2003.
-
-
-
|