-
1
-
-
0002652530
-
Security protocols and their properties
-
Foundations of Secure Computation, IOS Press
-
Abadi M. Security protocols and their properties. Foundations of Secure Computation. NATO ASI (2000), IOS Press 39-60
-
(2000)
NATO ASI
, pp. 39-60
-
-
Abadi, M.1
-
2
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ACM
-
Abadi M., and Fournet C. Mobile values, new names, and secure communication. Proceedings of POPL '01 (2001), ACM 104-115
-
(2001)
Proceedings of POPL '01
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi M., and Gordon A.D. A calculus for cryptographic protocols: The spi calculus. Information and Computation 148 1 (1999) 1-70
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
Proceedings of ESORICS'03, Springer-Verlag, Heidelberg
-
Basin D., Mödersheim S., and Viganò L. An on-the-fly model-checker for security protocol analysis. Proceedings of ESORICS'03. LNCS vol. 2808 (2003), Springer-Verlag, Heidelberg 253-270
-
(2003)
LNCS
, vol.2808
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
7
-
-
84942246406
-
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, H. Nielson, Automatic validation of protocol narration, in: Proceedings of 16th IEEE Computer Security Foundations Workshop, CSFW 16, 2003, pp. 126-140
-
-
-
-
8
-
-
24144452823
-
Static validation of security protocols
-
Bodei C., Buchholtz M., Degano P., Nielson F., and Nielson H. Static validation of security protocols. Journal of Computer Security 13 (2005) 347-390
-
(2005)
Journal of Computer Security
, vol.13
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.5
-
9
-
-
35048863862
-
Symbolic bisimulation in the spi calculus
-
Proceedings of CONCUR 2004, Springer
-
Borgström J., Briais S., and Nestmann U. Symbolic bisimulation in the spi calculus. Proceedings of CONCUR 2004. LNCS vol. 3170 (2004), Springer 161-176
-
(2004)
LNCS
, vol.3170
, pp. 161-176
-
-
Borgström, J.1
Briais, S.2
Nestmann, U.3
-
10
-
-
36049025942
-
-
S. Briais, Formal proofs about hedges using the Coq proof assistant. http://lamp.epfl.ch/~sbriais/spi/hedges/hedge.html, 2004
-
-
-
-
11
-
-
36049013425
-
-
S. Briais, spyer. http://lamp.epfl.ch/spyer, 2006
-
-
-
-
12
-
-
23144446730
-
Deconstructing alice and bob
-
Proceedings of the ICALP 2005 Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA'05
-
Caleiro C., Viganò L., and Basin D. Deconstructing alice and bob. Proceedings of the ICALP 2005 Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA'05. ENTCS vol. 135.1 (2005) 3-22
-
(2005)
ENTCS
, vol.135 1
, pp. 3-22
-
-
Caleiro, C.1
Viganò, L.2
Basin, D.3
-
13
-
-
33750486827
-
On the semantics of alice and bob specifications of security protocols
-
Caleiro C., Viganò L., and Basin D. On the semantics of alice and bob specifications of security protocols. Theoretical Computer Science 367 1 (2006) 88-122
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1
, pp. 88-122
-
-
Caleiro, C.1
Viganò, L.2
Basin, D.3
-
14
-
-
36048989109
-
-
J.A. Clark, J.L. Jacob, A survey of authentication protocol literature, Technical Report 1.0, University of York, 1997
-
-
-
-
15
-
-
0035751907
-
-
F. Crazzolara, G. Winskel, Events in security protocols, in: ACM Conference on Computer and Communications Security, 2001, pp. 96-105
-
-
-
-
16
-
-
84877781491
-
Composing strand spaces
-
FSTTCS '02. Agrawal M., and Seth A. (Eds), Springer
-
Crazzolara F., and Winskel G. Composing strand spaces. In: Agrawal M., and Seth A. (Eds). FSTTCS '02. LNCS vol. 2556 (2002), Springer 97-108
-
(2002)
LNCS
, vol.2556
, pp. 97-108
-
-
Crazzolara, F.1
Winskel, G.2
-
17
-
-
24944514681
-
Operational semantics of security protocols
-
Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 Post-Seminar Proceedings)
-
Cremers C., and Mauw S. Operational semantics of security protocols. Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 Post-Seminar Proceedings). LNCS vol. 3466 (2005)
-
(2005)
LNCS
, vol.3466
-
-
Cremers, C.1
Mauw, S.2
-
19
-
-
36048964281
-
-
C. Gensoul, Spyer - un compilateur de protocoles cryptographiques, Semester Project Report, EPFL, July 2003
-
-
-
-
20
-
-
0033714403
-
-
J.D. Guttman, F.J. Thayer Fábrega, Protocol independence through disjoint encryption, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW'00, 2000, pp. 24-34
-
-
-
-
23
-
-
84956860311
-
Compiling and verifying security protocols
-
Logic for Programming and Automated Reasoning, Springer-Verlag
-
Jacquemard F., Rusinowitch M., and Vigneron L. Compiling and verifying security protocols. Logic for Programming and Automated Reasoning. LNCS vol. 1955 (2000), Springer-Verlag 131-160
-
(2000)
LNCS
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
24
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe G. Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6 (1998) 53-84
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
26
-
-
36049014748
-
-
J.K. Millen, CAPSL: Common authentication protocol specification language. http://www.csl.sri.com/users/millen/capsl/
-
-
-
-
27
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6 1-2 (1998) 85-128
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
28
-
-
33646178885
-
Translating security protocols from informal notation into spi calculus
-
written in Japanese, abstract in English
-
Sumii E., Tatsuzawa H., and Yonezawa A. Translating security protocols from informal notation into spi calculus. IPSJ Transactions on Programming 45 (SIG 12) 1-10 (2004) written in Japanese, abstract in English
-
(2004)
IPSJ Transactions on Programming
, vol.45 SIG 12
, Issue.1-10
-
-
Sumii, E.1
Tatsuzawa, H.2
Yonezawa, A.3
|