-
1
-
-
84937720349
-
Security, protocols and specifications
-
Proc. Foundations of Software Science and Computation Structures
-
M. Abadi. Security, protocols and specifications. In Proc. Foundations of Software Science and Computation Structures, volume 1578 of LNCS, pages 1-13, 1999.
-
(1999)
LNCS
, vol.1578
, pp. 1-13
-
-
Abadi, M.1
-
2
-
-
0037052276
-
Secure implementation of channel abstractions
-
M. Abadi, C. Fournet, and G. Gonthier. Secure implementation of channel abstractions. Information and Computation, 174(1):37-83, 2002.
-
(2002)
Information and Computation
, vol.174
, Issue.1
, pp. 37-83
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
0035838828
-
Static analysis for the pi-calculus with applications to security
-
C. Bodei, P. Degano, F. Nielson, and H. R. Nielson. Static analysis for the pi-calculus with applications to security. Information and Computation, 168:68-92, 2001.
-
(2001)
Information and Computation
, vol.168
, pp. 68-92
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
5
-
-
0036574573
-
Flow logic for dolev-yao secrecy in cryptographic processes
-
C. Bodei, P. Degano, F. Nielson, and H. R. Nielson. Flow logic for dolev-yao secrecy in cryptographic processes. Future Generation Computer Systems, 18(6):747-756, 2002.
-
(2002)
Future Generation Computer Systems
, vol.18
, Issue.6
, pp. 747-756
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.R.4
-
6
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
Automata, Languages and Programming
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In Automata, Languages and Programming, LNCS, pages 667-681, 2001.
-
(2001)
LNCS
, pp. 667-681
-
-
Boreale, M.1
-
8
-
-
84942246406
-
Automatic validation of protocol narration
-
IEEE Computer Society Press
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. R. Nielson. Automatic validation of protocol narration. In Proceedings of The 16th Computer Security Foundations Workshop. IEEE Computer Society Press, 2003.
-
(2003)
Proceedings of the 16th Computer Security Foundations Workshop
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.R.5
-
11
-
-
0039926997
-
A compiler for analysing cryptographic protocols using non-interference
-
A. Durante, R. Focardi, and R. Gorrieri. A compiler for analysing cryptographic protocols using non-interference. ACM Transactions on Software Engineering and Methodology, 9(4):489-530, 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 489-530
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
12
-
-
35048902864
-
Cvs at work: A report on new failures upon some cryptographic protocols
-
Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security
-
A. Durante, R. Focardi, and R. Gorrieri. Cvs at work: A report on new failures upon some cryptographic protocols. In Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, LNCS 2052, 2001.
-
(2001)
LNCS
, vol.2052
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
14
-
-
84988393004
-
Classification of security properties (part i: Information flow)
-
Foundations of Security Analysis and Design
-
R. Focardi and R. Gorrieri. Classification of security properties (part i: Information flow). In Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 331-396, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
15
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
Proceedings of 27th International Colloquium in Automata, Languages and Programming
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In Proceedings of 27th International Colloquium in Automata, Languages and Programming, volume 1853 of LNCS, pages 354-372, 2000.
-
(2000)
LNCS
, vol.1853
, pp. 354-372
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
16
-
-
0037421091
-
A comparison of three authentication properties
-
R. Focardi, R. Gorrieri, and F. Martinelli. A comparison of three authentication properties. Theoretical Computer Science, 291(3):285-327, 2003.
-
(2003)
Theoretical Computer Science
, vol.291
, Issue.3
, pp. 285-327
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
17
-
-
84958046259
-
A uniform approach for the definition of security properties
-
Proceedings of World Congress on Formal Methods (FM'99)
-
R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proceedings of World Congress on Formal Methods (FM'99), volume 1708 of LNCS, pages 794-813, 1999.
-
(1999)
LNCS
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, F.2
-
20
-
-
23044531604
-
Notes on nominal calculi for security and mobility
-
Foundations of Security Analysis and Design
-
A. D. Gordon. Notes on nominal calculi for security and mobility. In Foundations of Security Analysis and Design, volume 2171 of LNCS, pages 262-330, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 262-330
-
-
Gordon, A.D.1
-
22
-
-
0342658605
-
Breaking and fixing the Needham Schroeder public-key protocol using FDR
-
Proceedings of Tools and Algorithms for the Construction and the Analisys of Systems, Springer Verlag
-
G. Lowe. Breaking and fixing the Needham Schroeder public-key protocol using FDR. In Proceedings of Tools and Algorithms for the Construction and the Analisys of Systems, volume 1055 of LNCS, pages 147-166. Springer Verlag, 1996.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
23
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6:53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
24
-
-
84956982499
-
Symbolic semantics and analysis for crypto-ccs with (almost) generic inference systems
-
Proceedings of the 27th international Symposium in Mathematical Foundations of Computer Sciences(MFCS'02)
-
F. Martinelli. Symbolic semantics and analysis for crypto-ccs with (almost) generic inference systems. In Proceedings of the 27th international Symposium in Mathematical Foundations of Computer Sciences(MFCS'02), volume 2420 of LNCS, pages 519-531.
-
LNCS
, vol.2420
, pp. 519-531
-
-
Martinelli, F.1
-
26
-
-
0037209815
-
Analysis of security protocols as open systems
-
F. Martinelli. Analysis of security protocols as open systems. Theoretical Computer Science, 290(1):1057-1106, 2003.
-
(2003)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 1057-1106
-
-
Martinelli, F.1
-
27
-
-
35248833600
-
Symbolic partial model checking for security analysis
-
Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, To appear
-
F. Martinelli. Symbolic partial model checking for security analysis. In Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, LNCS, 2003. To appear.
-
(2003)
LNCS
-
-
Martinelli, F.1
-
28
-
-
0038893943
-
Information flow vs. resource access in the asynchronous pi-calculus
-
J. Rieley and Matthew Hennessy. Information flow vs. resource access in the asynchronous pi-calculus. ACM Trans. on Progr. Lang, and Systems (TOPLAS), 24(5):566-591, 2002.
-
(2002)
ACM Trans. on Progr. Lang, and Systems (TOPLAS)
, vol.24
, Issue.5
, pp. 566-591
-
-
Rieley, J.1
Hennessy, M.2
-
30
-
-
44049113210
-
A calculus of mobile processes
-
R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes. Information and Computation, 100(1):1-77, 1992.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
31
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroder, M.D.2
-
32
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
A. Roscoe and P. Broadfoot. Proving security protocols with model checkers by data independence techniques. Journal of Computer Security, 7(2-3):147-190, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 147-190
-
-
Roscoe, A.1
Broadfoot, P.2
-
33
-
-
0003777431
-
-
Addison-Wesley
-
P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. The Modelling and Analysis of Security Protocols: the CSP Approach. Addison-Wesley, 2001.
-
(2001)
The Modelling and Analysis of Security Protocols: The CSP Approach
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
34
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, Springer-Verlag
-
P. Samarati and S. D. C. di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2171
-
-
Samarati, P.1
Di Vimercati, S.D.C.2
|