-
1
-
-
0037052276
-
Secure implementation of channel abstractions
-
Abadi, M., Fournet, C., Gonthier, G.: Secure implementation of channel abstractions. Inf. Comput. 174(1), 37-83 (2002)
-
(2002)
Inf. Comput
, vol.174
, Issue.1
, pp. 37-83
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
2
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)
-
ACM Press, New York
-
Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract). In: STOC '98. Proceedings of the thirtieth annual ACM symposium on Theory of computing, pp. 419-428. ACM Press, New York (1998)
-
(1998)
STOC '98. Proceedings of the thirtieth annual ACM symposium on Theory of computing
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Gordon, A.D, ed, ETAPS 2003 and FOSSACS 2003, Springer, Heidelberg
-
Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) ETAPS 2003 and FOSSACS 2003. LNCS, vol. 2620, Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2620
-
-
Blanchet, B.1
Podelski, A.2
-
4
-
-
84947780217
-
-
Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, 2706, pp. 148-164. Springer, Heidelberg (2003)
-
Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 148-164. Springer, Heidelberg (2003)
-
-
-
-
5
-
-
38049006464
-
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
-
Timisoara, Romania September
-
Cortier, V., Hördegen, H., Warinschi, B.: Explicit Randomness is not Necessary when Modeling Probabilistic Encryption. In: ICS 2006. Workshop on Information and Computer Security, Timisoara, Romania (September 2006)
-
(2006)
ICS 2006. Workshop on Information and Computer Security
-
-
Cortier, V.1
Hördegen, H.2
Warinschi, B.3
-
6
-
-
24644437051
-
-
Cortier, V., Warinschi, B.: Computationally Sound, Automated Proofs for Security Protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 157-171. Springer, Heidelberg (2005)
-
Cortier, V., Warinschi, B.: Computationally Sound, Automated Proofs for Security Protocols. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 157-171. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
38048998552
-
Synthesizing secure protocols
-
INRIA April, available at
-
Cortier, V., Warinschi, B., Zǎlinescu, E.: Synthesizing secure protocols. Inria research report, INRIA (April 2007), available at http://www.loria.fr/cortier/Papiers/compiler.pdf
-
(2007)
Inria research report
-
-
Cortier, V.1
Warinschi, B.2
Zǎlinescu, E.3
-
8
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. J. Comput. Secur. 13(3), 423-482 (2005)
-
(2005)
J. Comput. Secur
, vol.13
, Issue.3
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
9
-
-
0042500424
-
Undecidability of bounded security protocols
-
Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Undecidability of bounded security protocols. In: Proc. of the Workshop on Formal Methods and Security Protocols (1999)
-
(1999)
Proc. of the Workshop on Formal Methods and Security Protocols
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
10
-
-
0023545076
-
How to play any mental game
-
ACM Press, New York
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: STOC '87. Proceedings of the nineteenth annual ACM conference on Theory of computing, pp. 218-229. ACM Press, New York (1987)
-
(1987)
STOC '87. Proceedings of the nineteenth annual ACM conference on Theory of computing
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110-125. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
13
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
14
-
-
0030708255
-
A hierarchy of authentication specifications
-
Rockport, Massachusetts, USA, IEEE Computer Society Press, Los Alamitos
-
Lowe, G.: A hierarchy of authentication specifications. In: CSFW 1997, Rockport, Massachusetts, USA, IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
CSFW
-
-
Lowe, G.1
-
15
-
-
0031634547
-
Towards a completeness result for model checking of security protocols
-
IEEE Computer Society Press, Los Alamitos
-
Lowe, G.: Towards a completeness result for model checking of security protocols. In: CSFW 1998, IEEE Computer Society Press, Los Alamitos (1998)
-
(1998)
CSFW
-
-
Lowe, G.1
-
17
-
-
0034822801
-
Protocol insecurity with finite number of sessions is NP-complete. In: CSFW
-
Los Alamitos
-
Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: CSFW 2001, pp. 174-190. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
174-190. IEEE Computer Society Press
, pp. 2001
-
-
Rusinowitch, M.1
Turuani, M.2
|