-
1
-
-
84948759231
-
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
-
Cape Breton, NS, Canada, June IEEE Computer Society Press
-
Frederic Butler, Iliano Cervesato, Aaron D. Jaggard, and Andre Scedrov. A Formal Analysis of Some Properties of Kerberos 5 Using MSR. In Fifteenth Computer Security Foundations Workshop - CSFW-15, pages 175-190, Cape Breton, NS, Canada, June 2002. IEEE Computer Society Press.
-
(2002)
Fifteenth Computer Security Foundations Workshop - CSFW-15
, pp. 175-190
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
-
2
-
-
14844345282
-
Interpreting Strands in Linear Logic
-
H. Veith, N. Heintze, and E. Clark, editors, Chicago, IL, July
-
Iliano Cervesato, Nancy Durgin, Max I. Kanovich, and Andre Scedrov. Interpreting Strands in Linear Logic. In H. Veith, N. Heintze, and E. Clark, editors, 2000 Workshop on Formal Methods and Computer Security - FMCS'00, Chicago, IL, July 2000.
-
(2000)
2000 Workshop on Formal Methods and Computer Security - FMCS'00
-
-
Cervesato, I.1
Durgin, N.2
Kanovich, M.I.3
Scedrov, A.4
-
3
-
-
0032671775
-
A meta-notation for protocol analysis
-
P. Syverson, editor. Mordano, Italy, June IEEE Computer Society Press.
-
Iliano Cervesato, Nancy A. Durgin, Patrick D. Lincoln, John C. Mitchell, and Andre Scedrov. A meta-notation for protocol analysis. In P. Syverson, editor. Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99, pages 55-69, Mordano, Italy, June 1999. IEEE Computer Society Press.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
4
-
-
0033698744
-
Relating strands and multiset rewriting for security protocol analysis
-
P. Syverson, editor, Cambrige, UK, 3-5 July IEEE Computer Society Press
-
Iliano Cervesato, Nancy A. Durgin, Patrick D. Lincoln, John C. Mitchell, and Andre Scedrov. Relating strands and multiset rewriting for security protocol analysis. In P. Syverson, editor, 13th IEEE Computer Security Foundations Workshop - CSFW'00, pages 35-51, Cambrige, UK, 3-5 July 2000. IEEE Computer Society Press.
-
(2000)
13th IEEE Computer Security Foundations Workshop - CSFW'00
, pp. 35-51
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
5
-
-
84955619856
-
Typed MSR: Syntax and Examples
-
V.I. Gorodetski, V.A. Skormin, and L.J. Popyack, editors, First International Workshop on Mathematical Methods. Models and Architectures for Computer Networks Security - MMM'01, St. Petersburg, Russia, May Springer-Verlag
-
Iliano Cervesato. Typed MSR: Syntax and Examples. In V.I. Gorodetski, V.A. Skormin, and L.J. Popyack, editors, First International Workshop on Mathematical Methods. Models and Architectures for Computer Networks Security - MMM'01, pages 159-177, St. Petersburg, Russia, May 2001. Springer-Verlag LNCS 2052.
-
(2001)
LNCS
, vol.2052
, pp. 159-177
-
-
Cervesato, I.1
-
6
-
-
3042529055
-
Undecidability of bounded security protocols
-
N. Heintze and E. Clarke, editors, Trento, Italy, July Extended version
-
Nancy Durgin, Patrick Lincoln, John Mitchell, and Andre Scedrov. Undecidability of bounded security protocols. In N. Heintze and E. Clarke, editors, Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP, Trento, Italy, July 1999. Extended version at ftp://ftp.cis.upenn.edu/pub/papers/scedrov/msr-long.ps.
-
(1999)
Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
7
-
-
0009899187
-
CAPSL Intermediate Language
-
N. Heintze and E. Clarke, editors, Trento, Italy, July
-
Grit Denker and Jonathan K. Millen. CAPSL Intermediate Language. In N. Heintze and E. Clarke, editors, Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP, Trento, Italy, July 1999.
-
(1999)
Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP
-
-
Denker, G.1
Millen, J.K.2
-
9
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
Oakland, CA, May IEEE Computer Society Press
-
F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces: Why is a security protocol correct? In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 160-171, Oakland, CA, May 1998. IEEE Computer Society Press.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
10
-
-
0032671776
-
Mixed strand spaces
-
P. Syverson, editor, Mordano, Italy, June IEEE Computer Society Press
-
F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Mixed strand spaces. In P. Syverson, editor, Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99, pages 72-82, Mordano, Italy, June 1999. IEEE Computer Society Press.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99
, pp. 72-82
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
11
-
-
0032670463
-
Honest functions and their application to the analysis of cryptographic protocols
-
P. Syverson, editor, Mordano, Italy, June IEEE Computer Society Press
-
A. Maneki. Honest functions and their application to the analysis of cryptographic protocols. In P. Syverson, editor, Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99, pages 83-89, Mordano, Italy, June 1999. IEEE Computer Society Press.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99
, pp. 83-89
-
-
Maneki, A.1
-
12
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
13
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
Mordano, Italy, June IEEE Computer Society Press
-
Dawn Song. Athena: a new efficient automatic checker for security protocol analysis. In Proceedings of the Twelth IEEE Computer Security Foundations Workshop, pages 192-202, Mordano, Italy, June 1999. IEEE Computer Society Press.
-
(1999)
Proceedings of the Twelth IEEE Computer Security Foundations Workshop
, pp. 192-202
-
-
Song, D.1
|