-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
September
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0012796292
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
to appear
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, to appear.
-
Journal of Cryptology
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
0041486245
-
Systematic design of two-party authentication protocols
-
Springer-Verlag
-
R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic design of two-party authentication protocols. In Advances in Cryptology - Proceedings of CRYPTO 91. Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology - Proceedings of CRYPTO 91
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
5
-
-
0025386404
-
A Logic of Authentication
-
February
-
Michael Burrows, Martin Abadi, and Roger Needham. A Logic of Authentication. ACM Transactions in Computer Systems, 8(1):18-36, February 1990.
-
(1990)
ACM Transactions in Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
1542593353
-
Authentication and Authenticated Key Exchanges
-
Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
9
-
-
0020720357
-
On the Security of Public Key Protocols
-
March
-
D. Dolev and A. Yao. On the Security of Public Key Protocols. IEEE Transactions on Information Theory, 29(2):198-208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
12
-
-
84974597207
-
Non interference for the analysis of cryptographic protocols
-
U. Montanari, editor, 27th International Colloquium on Automata, Languages and Programming (ICALP'00) July
-
R. Focardi, R. Gorrieri, and F. Martinelli. Non interference for the analysis of cryptographic protocols. In U. Montanari, editor, 27th International Colloquium on Automata, Languages and Programming (ICALP'00). Springer Verlag: LNCS 1583, July 2000.
-
(2000)
Springer Verlag: LNCS
, vol.1583
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
13
-
-
0003161603
-
Fail-stop protocols: An approach to designing secure protocols
-
R. K. Iyer, M. Morganti, Fuchs W. K, and V. Gligor, editors, IEEE Computer Society
-
Li Gong and Paul Syverson. Fail-stop protocols: An approach to designing secure protocols. In R. K. Iyer, M. Morganti, Fuchs W. K, and V. Gligor, editors, Dependable Computing for Critical Applications 5, pages 79-100. IEEE Computer Society, 1998.
-
(1998)
Dependable Computing for Critical Applications 5
, pp. 79-100
-
-
Gong, L.1
Syverson, P.2
-
16
-
-
35248815623
-
Typing one-to-one and one-to-many correspondences in security protocols
-
International Software Security Symposium (ISSS 2002)
-
A. Gordon and A. Jeffrey. Typing one-to-one and one-to-many correspondences in security protocols. In International Software Security Symposium (ISSS 2002). Springer LNCS, 2003.
-
(2003)
Springer LNCS
-
-
Gordon, A.1
Jeffrey, A.2
-
17
-
-
0038290894
-
-
Internet Draft draft-ietf-ipsec-soi-features-01.txt, May 31
-
Paul Hoffman. Features of proposed successors to IKE. Internet Draft draft-ietf-ipsec-soi-features-01.txt, May 31 2002. available at http://ietf.org/internet-drafts/draft-ietf-ipsec-soi-features-01.txt.
-
(2002)
Features of Proposed Successors to IKE
-
-
Hoffman, P.1
-
20
-
-
0342880800
-
Applying Formal Methods to the Analysis of a Key Management Protocol
-
C. Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security, 1:5-53, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
21
-
-
0035075103
-
A cost-based framework for analysis of denial of service in networks
-
C. Meadows. A cost-based framework for analysis of denial of service in networks. Journal of Computer Security, 2001.
-
(2001)
Journal of Computer Security
-
-
Meadows, C.1
-
22
-
-
35248830539
-
A formal specification of requirements for payment in the SET protocol
-
Proceedings of Financial Cryptography '98
-
C. Meadows and P. Syverson. A formal specification of requirements for payment in the SET protocol. In Proceedings of Financial Cryptography '98. Springer-Verlag LLNCS, 1998.
-
(1998)
Springer-Verlag LLNCS
-
-
Meadows, C.1
Syverson, P.2
-
25
-
-
1442267753
-
A probabilistic polynomial-time calculus for analysis of cryptographic protocols (preliminary report)
-
J.C. Mitchell, A. Ramanathan, A. Scedrov, and V. Teague. A probabilistic polynomial-time calculus for analysis of cryptographic protocols (preliminary report). Electronic Notes in Theoretical Computer Science, 45, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.45
-
-
Mitchell, J.C.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
30
-
-
1442341305
-
Formal requirements for key distribution protocols
-
Springer-Verlag
-
P. Syverson and C. Meadows. Formal requirements for key distribution protocols. In Proceedings of Eurocrypt '94. Springer-Verlag, 1994.
-
(1994)
Proceedings of Eurocrypt '94
-
-
Syverson, P.1
Meadows, C.2
-
31
-
-
0001937830
-
A formal language for cryptographic protocol requirements
-
P. Syverson and C. Meadows. A formal language for cryptographic protocol requirements. Designs, Codes, and Cryptography, 7(1/2):27-59, 1996.
-
(1996)
Designs, Codes, and Cryptography
, vol.7
, Issue.1-2
, pp. 27-59
-
-
Syverson, P.1
Meadows, C.2
|