-
1
-
-
0037432692
-
Secrecy types for asymmetric communication
-
Foundations of Software Science and Computation Structures, Springer
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In Foundations of Software Science and Computation Structures, volume 2030 of Lecture Notes in Computer Science, pages 25-41. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2030
, pp. 25-41
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
0001772130
-
Secrecy by typing in security protocols
-
September
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
5
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A.D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
19144369108
-
Programming Satan's computer
-
J. van Leeuwen, editor, Computer Science Today: Recent Trends and Developments, Springer
-
R. Anderson and R. Needham. Programming Satan's computer. In J. van Leeuwen, editor, Computer Science Today: Recent Trends and Developments, volume 1000 of Lecture Notes in Computer Science, pages 426-440. Springer, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1000
, pp. 426-440
-
-
Anderson, R.1
Needham, R.2
-
8
-
-
84948759231
-
A formal analysis of some properties of Kerberos 5 using MSR
-
IEEE Computer Society Press
-
F. Butler, I. Cervesato, A.D. Jaggard, and A. Scedrov. A formal analysis of some properties of Kerberos 5 using MSR. In 15th IEEE Computer Security Foundations Workshop, pages 175-190. IEEE Computer Society Press, 2002.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 175-190
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
-
9
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
9th International Static Analysis Symposium (SAS'02), Springer
-
B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02), volume 2477 of Lecture Notes in Computer Science, pages 242-259. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 242-259
-
-
Blanchet, B.1
-
10
-
-
84955619856
-
Typed MSR: Syntax and examples
-
First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, Springer
-
I. Cervesato. Typed MSR: Syntax and examples. In First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, volume 2052 of Lecture Notes in Computer Science, pages 159-177. Springer, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2052
, pp. 159-177
-
-
Cervesato, I.1
-
13
-
-
0030574543
-
A multiset semantics for the pi-calculus with replication
-
J. Engelfriet. A multiset semantics for the pi-calculus with replication. Theoretical Computer Science, 153:65-94, 1996.
-
(1996)
Theoretical Computer Science
, vol.153
, pp. 65-94
-
-
Engelfriet, J.1
-
14
-
-
84974776068
-
A classification of security properties for process algebra
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebra. Journal of Computer Security, 3(1):5-33, 1994.
-
(1994)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
15
-
-
26844480899
-
Message authentication through non-interference
-
International Conference on Algebraic Methodology And Software Technology (AMAST2000), Springer
-
R. Focardi, R. Gorrieri, and F. Martinelli. Message authentication through non-interference. In International Conference on Algebraic Methodology And Software Technology (AMAST2000), volume 1816 of Lecture Notes in Computer Science, pages 258-272. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1816
, pp. 258-272
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
17
-
-
0141658120
-
Typing correspondence assertions for communication protocols
-
Mathematical Foundations of Programming Semantics 17, Elsevier
-
A.D. Gordon and A. Jeffrey. Typing correspondence assertions for communication protocols. In Mathematical Foundations of Programming Semantics 17, volume 45 of Electronic Notes in Theoretical Computer Science. Elsevier, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.45
-
-
Gordon, A.D.1
Jeffrey, A.2
-
18
-
-
84948759702
-
Types and effects for asymmetric cryptographic protocols
-
IEEE Computer Society Press
-
A.D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. In 15th IEEE Computer Security Foundations Workshop, pages 77-91. IEEE Computer Society Press, 2002.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 77-91
-
-
Gordon, A.D.1
Jeffrey, A.2
-
21
-
-
3042597797
-
Validating a web service security abstraction by typing
-
To appear
-
A.D. Gordon and R. Pucella. Validating a web service security abstraction by typing. In ACM Workshop on XML Security, 2002. To appear.
-
(2002)
ACM Workshop on XML Security
-
-
Gordon, A.D.1
Pucella, R.2
-
22
-
-
0037076868
-
Authentication tests and the structure of bundles
-
J.D. Guttman and F. J. Thayer. Authentication tests and the structure of bundles. Theoretical Computer Science, 283(2):333-380, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Thayer, F.J.2
-
23
-
-
0345241830
-
-
Addison Wesley Professional
-
B.A. LaMacchia, S. Lange, M. Lyons, R. Martin, and K.T. Price. .NET Framework Security. Addison Wesley Professional, 2002.
-
(2002)
NET Framework Security
-
-
LaMacchia, B.A.1
Lange, S.2
Lyons, M.3
Martin, R.4
Price, K.T.5
-
24
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society Press
-
G. Lowe. A hierarchy of authentication specifications. In 10th IEEE Computer Security Foundations Workshop, pages 31-43. IEEE Computer Society Press, 1997.
-
(1997)
10th IEEE Computer Security Foundations Workshop
, pp. 31-43
-
-
Lowe, G.1
-
26
-
-
0030084918
-
The NRL Protocol Analyzer: An overview
-
C. Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
27
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
29
-
-
0029713842
-
Intensional specifications of security protocols
-
IEEE Computer Society Press
-
A.W. Roscoe. Intensional specifications of security protocols. In 8th IEEE Computer Security Foundations Workshop, pages 28-38. IEEE Computer Society Press, 1996.
-
(1996)
8th IEEE Computer Security Foundations Workshop
, pp. 28-38
-
-
Roscoe, A.W.1
|