-
1
-
-
35248848311
-
Computer-Assisted Verification of a Protocol for Certified Email
-
R. Cousot, editor, Static Analysis, 10th International Symposium (SAS'03), Springer-Verlag, June To appear
-
M. Abadi and B. Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. In R. Cousot, editor, Static Analysis, 10th International Symposium (SAS'03), Lecture Notes in Comp. Sci. Springer-Verlag, June 2003. To appear.
-
(2003)
Lecture Notes in Comp. Sci.
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
84982994153
-
Distributed access-rights management with delegation certificates
-
J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues with Distributed Mobile Objects, Springer-Verlag
-
T. Aura. Distributed access-rights management with delegation certificates. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues with Distributed Mobile Objects, volume 1603 of Lecture Notes in Comp. Sci., pages 211-235. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Comp. Sci.
, vol.1603
, pp. 211-235
-
-
Aura, T.1
-
5
-
-
0037237984
-
Inductive verification of smart card protocols
-
G. Bella. Inductive verification of smart card protocols. J. of Comp. Sec., 11(1):87-132, 2003.
-
(2003)
J. of Comp. Sec.
, vol.11
, Issue.1
, pp. 87-132
-
-
Bella, G.1
-
6
-
-
0037250327
-
Verifying the SET registration protocols
-
G. Bella, F. Massacci, and L. C. Paulson. Verifying the SET registration protocols. IEEE J. of Selected Areas in Communications, 21(1):77-87, 2003.
-
(2003)
IEEE J. of Selected Areas in Communications
, vol.21
, Issue.1
, pp. 77-87
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
7
-
-
84949486769
-
Mechanical proofs about a non-repudiation protocol
-
R. J. Boulton and P. B. Jackson, editors, Theorem Proving in Higher Order Logics: TPHOLs 2001, Springer
-
G. Bella and L. C. Paulson. Mechanical proofs about a non-repudiation protocol. In R. J. Boulton and P. B. Jackson, editors, Theorem Proving in Higher Order Logics: TPHOLs 2001, volume 2152 of Lecture Notes in Comp. Sci., pages 91-104. Springer, 2001.
-
(2001)
Lecture Notes in Comp. Sci.
, vol.2152
, pp. 91-104
-
-
Bella, G.1
Paulson, L.C.2
-
8
-
-
33748314395
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Comp. Society Press
-
B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Proc. of the 14th IEEE Comp. Sec. Found. Workshop. IEEE Comp. Society Press, 1998.
-
(1998)
Proc. of the 14th IEEE Comp. Sec. Found. Workshop
-
-
Blanchet, B.1
-
10
-
-
0003568551
-
-
Technical report, University of York, Department of Computer Science, November A complete specification of the dark-Jacob library in CAPSL is available at http://www.cs.sri.com/∼millen/capsl
-
J. Clark and J. Jacob. A survey of authentication protocol literature: Version 1.0. Technical report, University of York, Department of Computer Science, November 1997. Available on the web at http://www-users.cs.york.ac.uk/∼jac/. A complete specification of the dark-Jacob library in CAPSL is available at http://www.cs.sri.com/∼millen/capsl/.
-
(1997)
A Survey of Authentication Protocol Literature: Version 1.0
-
-
Clark, J.1
Jacob, J.2
-
11
-
-
0033718532
-
TAPS: A first-order verifier for cryptographic protocols
-
IEEE Comp. Society Press
-
E. Cohen. TAPS: A first-order verifier for cryptographic protocols. In Proc. of the 13th IEEE Comp. Sec. Found. Workshop, pages 144-158. IEEE Comp. Society Press, 2000.
-
(2000)
Proc. of the 13th IEEE Comp. Sec. Found. Workshop
, pp. 144-158
-
-
Cohen, E.1
-
13
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR
-
T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems: second international workshop, TACAS '96, Springer
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using CSP and FDR. In T. Margaria and B. Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems: second international workshop, TACAS '96, volume 1055 of Lecture Notes in Comp. Sci., pages 147-166. Springer, 1996.
-
(1996)
Lecture Notes in Comp. Sci.
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
14
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. J. of Comp. Sec., 6:85-128, 1998.
-
(1998)
J. of Comp. Sec.
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
15
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
L. C. Paulson. Inductive analysis of the internet protocol TLS. ACM Thins, on Inform. and Sys. Sec., 2(3):332-351, 1999.
-
(1999)
ACM Thins. on Inform. and Sys. Sec.
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
|