-
1
-
-
0029713792
-
Subtyping dependent types
-
E. Clarke, editor, New Brunswick, New Jersey, July IEEE Computer Society Press
-
David Aspinall and Adriana Compagnoni. Subtyping dependent types. In E. Clarke, editor, Proceedings of the 11th Annual Symposium on Logic in Computer Science, pages 86-97, New Brunswick, New Jersey, July 1996. IEEE Computer Society Press.
-
(1996)
Proceedings of the 11th Annual Symposium on Logic in Computer Science
, pp. 86-97
-
-
Aspinall, D.1
Compagnoni, A.2
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 148(1):1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
4
-
-
0000523051
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society, Series A, 426(1871):233-271, 1989.
-
(1989)
Proceedings of the Royal Society, Series A
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
6
-
-
0032671775
-
A meta-notation for protocol analysis
-
P. Syverson, editor, Mordano, Italy, June
-
Iliano Cervesato, Nancy A. Durgin, Patrick D. Lincoln, John C. Mitchell, and Andre Scedrov. A meta-notation for protocol analysis. In P. Syverson, editor, Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99, pages 55-69, Mordano, Italy, June 1999.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
8
-
-
35048866157
-
Typed multiset rewriting specifications of security protocols
-
A. Seda, editor, Cork, Ireland, 19-21 July Elsevier ENTCS
-
Iliano Cervesato. Typed multiset rewriting specifications of security protocols. In A. Seda, editor, Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology - MFCSIT'00, Cork, Ireland, 19-21 July 2000. Elsevier ENTCS.
-
(2000)
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology - MFCSIT'00
-
-
Cervesato, I.1
-
9
-
-
3042580206
-
A specification language for crypto-protocol based on multiset rewriting, dependent types and subsorting
-
G. Delzanno, S. Etalle, and M. Gabbrielli, editors, Paphos, Cyprus
-
Iliano Cervesato. A specification language for crypto-protocol based on multiset rewriting, dependent types and subsorting. In G. Delzanno, S. Etalle, and M. Gabbrielli, editors, Workshop on Specification, Analysis and Validation for Emerging Technologies - SAVE'01, Paphos, Cyprus, 2001.
-
(2001)
Workshop on Specification, Analysis and Validation for Emerging Technologies - SAVE'01
-
-
Cervesato, I.1
-
10
-
-
84955619856
-
Typed MSR: Syntax and examples
-
V. Gorodetski, V. Skormin, and L. Popyack, editors, Proceedings of the First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security - MMM'01, St. Petersburg, Russia, Springer-Verlag
-
Iliano Cervesato. Typed MSR: Syntax and examples. In V. Gorodetski, V. Skormin, and L. Popyack, editors, Proceedings of the First International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security - MMM'01, pages 159-177, St. Petersburg, Russia, 2001. Springer-Verlag LNCS 2052.
-
(2001)
LNCS
, vol.2052
, pp. 159-177
-
-
Cervesato, I.1
-
12
-
-
18944370949
-
-
Ph. de Groote, editor. Academia
-
Ph. de Groote, editor. The Curry-Howard Isomorphism, volume 8 of Cahiers du Centre de Logique, Département de Philosophie, Université Catholique de Louvain. Academia, 1995.
-
(1995)
The Curry-Howard Isomorphism, Volume 8 of Cahiers du Centre de Logique, Département de Philosophie, Université Catholique de Louvain
, vol.8
-
-
-
13
-
-
0009899187
-
CAPSL Intermediate Language
-
N. Heintze and E. Clarke, editors, Trento, Italy, July
-
Grit Denker and Jonathan K. Millen. CAPSL Intermediate Language. In N. Heintze and E. Clarke, editors, Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP, Trento, Italy, July 1999.
-
(1999)
Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP
-
-
Denker, G.1
Millen, J.K.2
-
14
-
-
0033701252
-
Optimizing protocol rewrite rules of CIL specifications
-
Cambrige, UK, July
-
Grit Denker, Jonathan Millen, A. Grau, and J. Filipe. Optimizing protocol rewrite rules of CIL specifications. In 13th IEEE Computer Security Foundations Workshop - CSFW'00, pages 52-62, Cambrige, UK, July 2000.
-
(2000)
13th IEEE Computer Security Foundations Workshop - CSFW'00
, pp. 52-62
-
-
Denker, G.1
Millen, J.2
Grau, A.3
Filipe, J.4
-
16
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
Oakland, CA, May
-
F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces: Why is a security protocol correct? In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 160-171, Oakland, CA, May 1998.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
18
-
-
0027353175
-
A framework for defining logics
-
January
-
Robert Harper, Furio Honsell, and Gordon Plotkin. A framework for defining logics. Journal of the Association for Computing Machinery, 40(1):143-184, January 1993.
-
(1993)
Journal of the Association for Computing Machinery
, vol.40
, Issue.1
, pp. 143-184
-
-
Harper, R.1
Honsell, F.2
Plotkin, G.3
-
19
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Gavin Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6:53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
20
-
-
0003735470
-
Model checking for security protocols
-
1997. A Preliminary version appeared as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May
-
Will Marrero, Edmund M. Clarke, and Somesh Jha. Model checking for security protocols. In Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols, 1997. A Preliminary version appeared as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May 1997.
-
(1997)
Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Marrero, W.1
Clarke, E.M.2
Jha, S.3
-
21
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: an overview. J. Logic Programming, 26(2):113-131, 1996.
-
(1996)
J. Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
22
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
24
-
-
0000360205
-
Refinement types for logical frameworks
-
Herman Geuvers, editor, Nijmegen, The Netherlands, May
-
Frank Pfenning. Refinement types for logical frameworks. In Herman Geuvers, editor, Informal Proceedings of the Workshop on Types for Proofs and Programs, pages 285-299, Nijmegen, The Netherlands, May 1993.
-
(1993)
Informal Proceedings of the Workshop on Types for Proofs and Programs
, pp. 285-299
-
-
Pfenning, F.1
-
25
-
-
0012013903
-
Dolev-Yao is no better than Machiavelli
-
P. Degano, editor, Geneva, Switzerland, 7-8 July
-
Paul Syverson, Catherine Meadows, and Iliano Cervesato. Dolev-Yao is no better than Machiavelli. In P. Degano, editor, First Workshop on Issues in the Theory of Security - WITS'00, pages 87-92, Geneva, Switzerland, 7-8 July 2000.
-
(2000)
First Workshop on Issues in the Theory of Security - WITS'00
, pp. 87-92
-
-
Syverson, P.1
Meadows, C.2
Cervesato, I.3
-
26
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
Mordano, Italy, June
-
Dawn Song. Athena: a new efficient automatic checker for security protocol analysis. In Proceedings of the Twelth IEEE Computer Security Foundations Workshop, pages 192-202, Mordano, Italy, June 1999.
-
(1999)
Proceedings of the Twelth IEEE Computer Security Foundations Workshop
, pp. 192-202
-
-
Song, D.1
|