-
1
-
-
2942563373
-
A Calculus for Cryptographic Protocols the Spi Calculus
-
January
-
M. Abadi, and A. D. Gordon, "A Calculus for Cryptographic Protocols The Spi Calculus", Digital Research Report, vol. 149, January 1998, pp. 1-110.
-
(1998)
Digital Research Report
, vol.149
, pp. 1-110
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
84885216561
-
On the Reachability Problem in Cryptographic Protocols
-
Proc. of CONCUR'2000, Springer-Verlag
-
R. Amadio, and D. Lugiez, "On the Reachability Problem in Cryptographic Protocols", Proc. of CONCUR'2000, LNCS 1877, pp. 380-394, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1877
, pp. 380-394
-
-
Amadio, R.1
Lugiez, D.2
-
3
-
-
0032597527
-
Proof Techniques for Cryptographic Processes
-
IEEE Computer Society Press
-
M. Boreale, R. De Nicola, and R. Pugliese, "Proof Techniques for Cryptographic Processes", Proc. of the 14th IEEE Symposium Logic In Computer Science (LICS'99), IEEE Computer Society Press, pp. 157-166, 1999.
-
(1999)
Proc. of the 14th IEEE Symposium Logic in Computer Science (LICS'99)
, pp. 157-166
-
-
Boreale, M.1
De Nicola, R.2
Pugliese, R.3
-
4
-
-
84879529172
-
Symbolic Trace Analysis of Cryptographic Protocols
-
Proc. 28th ICALP, Springer-Verlag
-
M. Boreale, "Symbolic Trace Analysis of Cryptographic Protocols", In Proc. 28th ICALP, Vol. 2076 of Lecture Notes in Computer Science, Springer-Verlag, pp. 667-681, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
5
-
-
0003257683
-
Using state space exploration and a natural deduction style message derivation engine to verify security protocols
-
Chapman & Hall, London
-
E. M. Clarke, S. Jha, and W. Marrero, "Using state space exploration and a natural deduction style message derivation engine to verify security protocols", Proc. of IFIP PROCOMET, Chapman & Hall, London, 1998, pp. p.87-106.
-
(1998)
Proc. of IFIP PROCOMET
, pp. 87-106
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
6
-
-
0039334690
-
Verifying security protocols with Brutus
-
October
-
E. M. Clarke, S. Jha, and W. Marrero, "Verifying security protocols with Brutus", ACM Trans. on Software Engineering and Methodology Vol. 9, No. 4, October 2000, pp. 443-487.
-
(2000)
ACM Trans. on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
7
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A. Yao, "On the security of public key protocols", IEEE Transactions on Information Theory, 29(2):198-208, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
8
-
-
3543072509
-
A state-exploration technique for spi-calculus testing equivalence verification
-
Pisa, October
-
L. Durante, R. Sisto, and A. Valenzano, "A state-exploration technique for spi-calculus testing equivalence verification", Proc. of FORTE/PSTV 2000, Pisa, October 2000, pp. 155-170.
-
(2000)
Proc. of FORTE/PSTV 2000
, pp. 155-170
-
-
Durante, L.1
Sisto, R.2
Valenzano, A.3
-
12
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proc. of TACAS'97, Springer
-
G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR", Proc. of TACAS'97, Springer LNCS 1055, 1996.
-
(1996)
LNCS
, vol.1055
-
-
Lowe, G.1
-
13
-
-
0027578148
-
Automatic Recognition of Tractability in Inference Relations
-
April
-
D. A. McAllester, "Automatic Recognition of Tractability in Inference Relations", Journal of the ACM, Vol. 40, No. 2, April 1993, pp. 284-303.
-
(1993)
Journal of the ACM
, vol.40
, Issue.2
, pp. 284-303
-
-
McAllester, D.A.1
-
15
-
-
44049113210
-
A Calculus of mobile processes, parts I and II
-
September
-
R. Milner, J. Parrow, and D. Walker, "A Calculus of mobile processes, parts I and II", Information and Computation, pages 1-40 and 41-77, September 1992.
-
(1992)
Information and Computation
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
16
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson, "The inductive approach to verifying cryptographic protocols", Journal of Computer Security, Vol. 6, pp. 85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
|