-
1
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi and B. Blanchet, Analyzing security protocols with secrecy types and logic programs, Journal of the ACM, vol. 52(1), pp. 102-146, 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
19144369108
-
Programming Satan's computer
-
Computer Science Today: Recent Trends and Developments (, J. van Leeuwen Ed, Springer-Verlag, Berlin, Germany, pp
-
R. Anderson and R. Needham, Programming Satan's computer, in Computer Science Today: Recent Trends and Developments (LNCS Vol. 1000), J. van Leeuwen (Ed.), Springer-Verlag, Berlin, Germany, pp. 426-440, 1995.
-
(1995)
LNCS
, vol.1000
, pp. 426-440
-
-
Anderson, R.1
Needham, R.2
-
3
-
-
26444497860
-
The AVISPA tool for the automated validation of Internet security protocols and applications
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P. Heam, O. Kouchnarenko, J. Mantovani, S. Modersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigano and L. Vigneron, The AVISPA tool for the automated validation of Internet security protocols and applications, Proceedings of the Seventeenth International Conference on Computer-Aided Verification, pp. 281-285, 2005.
-
(2005)
Proceedings of the Seventeenth International Conference on Computer-Aided Verification
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Hankes Drielsma, P.7
Heam, P.8
Kouchnarenko, O.9
Mantovani, J.10
Modersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigano, L.16
Vigneron, L.17
-
5
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. Yao, On the security of public key protocols, IEEE Transactions on Information Theory, vol. 29(2), pp. 198-208, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
6
-
-
33747764392
-
-
Cisco Press, Indianapolis, Indiana
-
L. Dryburgh and J. Hewitt, Signaling System No. 7 (SS7/C7): Protocol, Architecture and Services, Cisco Press, Indianapolis, Indiana, 2005.
-
(2005)
Signaling System No. 7 (SS7/C7): Protocol, Architecture and Services
-
-
Dryburgh, L.1
Hewitt, J.2
-
7
-
-
36249021994
-
-
Ph.D. Dissertation, Department of Computer Science, University of Tulsa, Tulsa, Oklahoma
-
J. Edmonds, Security Analysis of Multilayer Protocols in SCADA Networks, Ph.D. Dissertation, Department of Computer Science, University of Tulsa, Tulsa, Oklahoma, 2006.
-
(2006)
Security Analysis of Multilayer Protocols in SCADA Networks
-
-
Edmonds, J.1
-
8
-
-
33750477656
-
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
-
S. Escobar, C. Meadows and J. Meseguer, A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties, Theoretical Computer Science, vol. 367(1-2), pp. 162-202, 2006.
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 162-202
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
11
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe, Casper: A compiler for the analysis of security protocols, Journal of Computer Security, vol. 6, pp. 53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
15
-
-
0004192330
-
-
RFC 2719, October
-
L. Ong, I. Rytina, M. Garcia, H. Schwarzbauer, L. Coene, H. Lin, I. Juhasz, M. Holdrege and C. Sharp, Framework Architecture for Signaling Transport, RFC 2719, October 1999.
-
(1999)
Framework Architecture for Signaling Transport
-
-
Ong, L.1
Rytina, I.2
Garcia, M.3
Schwarzbauer, H.4
Coene, L.5
Lin, H.6
Juhasz, I.7
Holdrege, M.8
Sharp, C.9
-
16
-
-
0035483104
-
Formal analysis of E-commerce protocols
-
M. Papa, O. Bremer, J. Hale and S. Shenoi, Formal analysis of E-commerce protocols, IEICE Transactions on Information and Systems, vol. E84-D(10), pp. 1313-1323, 2001.
-
(2001)
IEICE Transactions on Information and Systems
, vol.E84-D
, Issue.10
, pp. 1313-1323
-
-
Papa, M.1
Bremer, O.2
Hale, J.3
Shenoi, S.4
-
17
-
-
84904304256
-
Integrating logics and process calculi for cryptographic protocol analysis
-
D. Gritzalis, S. De Capitani di Vimercati, P. Samarati and S. Katsikas Eds, Kluwer, Boston, pp
-
M. Papa, O. Bremer, J. Hale and S. Shenoi, Integrating logics and process calculi for cryptographic protocol analysis, in Security and Privacy in the Age of Uncertainty, D. Gritzalis, S. De Capitani di Vimercati, P. Samarati and S. Katsikas (Eds.), Kluwer, Boston, pp. 349-360, 2003.
-
(2003)
Security and Privacy in the Age of Uncertainty
, pp. 349-360
-
-
Papa, M.1
Bremer, O.2
Hale, J.3
Shenoi, S.4
|