-
2
-
-
84879078812
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Proceedings of the IFIP International Conference on Theoretical Computer Science (IFIP TCS2000), Springer-Verlag
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). In Proceedings of the IFIP International Conference on Theoretical Computer Science (IFIP TCS2000), volume 1872 of Lecture Notes in Computer Science, pages 3-22. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
19144367628
-
Towards an awareness-based semantics for security protocol analysis
-
Jean Goubault-Larrecq, editor, Elsevier Science Publishers
-
R. Accorsi, D. Basin, and L. Viganò. Towards an awareness-based semantics for security protocol analysis. In Jean Goubault-Larrecq, editor, Electronic Notes in Theoretical Computer Science, volume 55. Elsevier Science Publishers, 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.55
-
-
Accorsi, R.1
Basin, D.2
Viganò, L.3
-
5
-
-
84945119254
-
Entity authentication and key distribution
-
Proceedings of the 13th Annual International Cryptology Conference (CRYPTO '93)
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In Proceedings of the 13th Annual International Cryptology Conference (CRYPTO '93), volume 773 of Lecture Notes in Computer Science, pages 232-249, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
6
-
-
0025641513
-
A logic of communication in hostile environment
-
IEEE Computer Society Press
-
P. Bieber. A logic of communication in hostile environment. In Proceedings of the Computer Security Foundations Workshop, pages 14-22. IEEE Computer Society Press, 1990.
-
(1990)
Proceedings of the Computer Security Foundations Workshop
, pp. 14-22
-
-
Bieber, P.1
-
7
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
11
-
-
85034636582
-
On the security of ping-pong protocols when implemented using the RSA
-
Proceedings of Crypto'85, Springer-Verlag
-
S. Even, O. Goldreich, and A. Shamir. On the security of ping-pong protocols when implemented using the RSA. In Proceedings of Crypto'85, volume 218 of Lecture Notes in Computer Science, pages 58-72. Springer-Verlag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.218
, pp. 58-72
-
-
Even, S.1
Goldreich, O.2
Shamir, A.3
-
12
-
-
0023842375
-
Belief, awareness, and limited reasoning
-
R. Fagin and J. Y. Halpern. Belief, awareness, and limited reasoning. Artificial Intelligence, 34:39-76, 1988.
-
(1988)
Artificial Intelligence
, vol.34
, pp. 39-76
-
-
Fagin, R.1
Halpern, J.Y.2
-
13
-
-
84976774564
-
Reasoning about knowledge and probability
-
R. Fagin and J. Y. Halpern. Reasoning about knowledge and probability. Journal of the ACM, 41(2):340-367, 1994.
-
(1994)
Journal of the ACM
, vol.41
, Issue.2
, pp. 340-367
-
-
Fagin, R.1
Halpern, J.Y.2
-
18
-
-
0027665952
-
Knowledge, probability, and adversaries
-
J. Y. Halpern and M. R. Tuttle. Knowledge, probability, and adversaries. Journal of the ACM, 40(4):917-962, 1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.4
, pp. 917-962
-
-
Halpern, J.Y.1
Tuttle, M.R.2
-
20
-
-
0345373244
-
-
Announced in
-
Announced in Journal of Symbolic Logic, 24, 1959, p. 323.
-
(1959)
Journal of Symbolic Logic
, vol.24
, pp. 323
-
-
-
21
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
P. Lincoln, J. C. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proceedings of the ACM Conference on Computer and Communications Security, pages 112-121, 1998.
-
(1998)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.C.2
Mitchell, M.3
Scedrov, A.4
-
22
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56:131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
26
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
28
-
-
0023295108
-
The Interrogator: Protocol security analysis
-
J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, 13(2):274-288, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
30
-
-
0024014116
-
Protocol failures in cryptosystems
-
J. H. Moore. Protocol failures in cryptosystems. Proceedings of the IEEE, 76(5):594-602, 1988.
-
(1988)
Proceedings of the IEEE
, vol.76
, Issue.5
, pp. 594-602
-
-
Moore, J.H.1
-
31
-
-
3042898541
-
Resource-bounded knowledge
-
M. Y. Vardi, editor, Morgan Kaufmann, San Francisco, Calif.
-
Y. Moses. Resource-bounded knowledge. In M. Y. Vardi, editor, Proc. Second Conference on Theoretical Aspects of Reasoning about Knowledge, pages 261-276. Morgan Kaufmann, San Francisco, Calif., 1988.
-
(1988)
Proc. Second Conference on Theoretical Aspects of Reasoning about Knowledge
, pp. 261-276
-
-
Moses, Y.1
-
32
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
33
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1/2):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
34
-
-
0002219322
-
An attack on a recursive authentication protocol: A cautionary tale
-
P. Y. A. Ryan and S. A. Schneider. An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters, 65(1):7-10, 1998.
-
(1998)
Information Processing Letters
, vol.65
, Issue.1
, pp. 7-10
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
|