-
2
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. Journal of the ACM 52(1), 102-146 (2005)
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
24344493908
-
Computer-assisted verification of a protocol for certified email
-
Abadi, M., Blanchet, B.: Computer-assisted verification of a protocol for certified email. Science of Computer Programming 58(1-2), 3-27 (2005)
-
(2005)
Science of Computer Programming
, vol.58
, Issue.1-2
, pp. 3-27
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2-32 (2006)
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
6
-
-
17644411480
-
Mobile values, new names, and secure communication
-
January
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: 28th ACM Symposium on Principles of Programming Languages (POPL'01), pp. 104-115 (January 2001)
-
(2001)
28th ACM Symposium on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
8
-
-
0003092378
-
-
Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1-70 (1998) (An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998)
-
Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1-70 (1998) (An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998)
-
-
-
-
10
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
Abadi, M., Rogaway, P.: Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
11
-
-
3142632089
-
Just Fast Keying: Key agreement in a hostile internet
-
Aiello, W., Bellovin, S.M., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A.D., Reingold, O.: Just Fast Keying: Key agreement in a hostile internet. ACM Transactions on Information and System Security 7(2), 242-273 (2004)
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 242-273
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
12
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Palamidessi, C, ed, CONCUR 2000, Springer, Heidelberg
-
Amadio, R., Lugiez, D.: On the reachability problem in cryptographic protocols. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol. 1877, pp. 380-395. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1877
, pp. 380-395
-
-
Amadio, R.1
Lugiez, D.2
-
13
-
-
84958762859
-
-
Amadio, R., Prasad, S.: The game of the name in cryptographic tables. In: Thiagarajan, P.S., Yap, R.H.C. (eds.) ASIAN 1999. LNCS, 1742, pp. 15-27. Springer, Heidelberg (1999)
-
Amadio, R., Prasad, S.: The game of the name in cryptographic tables. In: Thiagarajan, P.S., Yap, R.H.C. (eds.) ASIAN 1999. LNCS, vol. 1742, pp. 15-27. Springer, Heidelberg (1999)
-
-
-
-
14
-
-
84957714601
-
Robustness principles for public key protocols
-
Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
-
Anderson, R., Needham, R.: Robustness principles for public key protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 236-247. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 236-247
-
-
Anderson, R.1
Needham, R.2
-
16
-
-
1442292329
-
A composable cryptographic library with nested operations
-
October
-
Backes, M., Pfitzmann, B., Waidner, M.: A composable cryptographic library with nested operations. In: 10th ACM conference on Computer and Communications security (CCS'03), pp. 220-230 (October 2003)
-
(2003)
10th ACM conference on Computer and Communications security (CCS'03)
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
17
-
-
4544313910
-
Spi calculus translated to pi-calculus preserving maytests
-
July
-
Baldamus, M., Parrow, J., Victor, B.: Spi calculus translated to pi-calculus preserving maytests. In: 19th Annual IEEE Symposium on Logic in Computer Science (LICS'04), pp. 22-31 (July 2004)
-
(2004)
19th Annual IEEE Symposium on Logic in Computer Science (LICS'04)
, pp. 22-31
-
-
Baldamus, M.1
Parrow, J.2
Victor, B.3
-
19
-
-
84945119254
-
Entity authentication and key distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
20
-
-
14844303360
-
Verifying policy-based security for web services
-
October
-
Bhargavan, K., Fournet, C., Gordon, A.D.: Verifying policy-based security for web services. In: ACM Conference on Computer and Communications Security (CCS'04), pp. 268-277 (October 2004)
-
(2004)
ACM Conference on Computer and Communications Security (CCS'04)
, pp. 268-277
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
21
-
-
33845212195
-
-
Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WSsecurity protocols. In: Bravetti, M., Núñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, 4184, pp. 88-106. Springer, Heidelberg (2006)
-
Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WSsecurity protocols. In: Bravetti, M., Núñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol. 4184, pp. 88-106. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
35048821943
-
-
Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: TulaFale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, 3188, pp. 197-222. Springer, Heidelberg (2004)
-
Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: TulaFale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol. 3188, pp. 197-222. Springer, Heidelberg (2004)
-
-
-
-
23
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
June
-
Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: 14th IEEE Computer Security Foundations Workshop, pp. 82-96 (June 2001)
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
24
-
-
84958749546
-
-
Blanchet, B.: From secrecy to authenticity in security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, 2477, pp. 342-359. Springer, Heidelberg (2002)
-
Blanchet, B.: From secrecy to authenticity in security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 342-359. Springer, Heidelberg (2002)
-
-
-
-
25
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
May
-
Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: 2004 IEEE Symposium on Security and Privacy, pp. 86-100 (May 2004)
-
(2004)
2004 IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
Blanchet, B.1
-
26
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
May
-
Blanchet, B.: A computationally sound mechanized prover for security protocols. In: 2006 IEEE Symposium on Security and Privacy, pp. 140-154 (May 2006)
-
(2006)
2006 IEEE Symposium on Security and Privacy
, pp. 140-154
-
-
Blanchet, B.1
-
28
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Gordon, A.D, ed, Foundations of Software Science and Computation Structures: 6th International Conference, FOSSACS 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS, Warsaw, Poland, April 7-11, Springer, Heidelberg () 2003
-
Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) Foundations of Software Science and Computation Structures: 6th International Conference, FOSSACS 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003. LNCS, vol. 2620, pp. 136-152. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2620
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
29
-
-
33749579704
-
Automated security proofs with sequences of games
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Blanchet, B., Pointcheval, D.: Automated security proofs with sequences of games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 537-554. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 537-554
-
-
Blanchet, B.1
Pointcheval, D.2
-
31
-
-
0036574573
-
Flow logic for Dolev-Yao secrecy in cryptographic processes
-
Bodei, C., Degano, P., Nielson, F., Nielson, H.: Flow logic for Dolev-Yao secrecy in cryptographic processes. Future Generation Computer Systems 18(6), 747-756 (2002)
-
(2002)
Future Generation Computer Systems
, vol.18
, Issue.6
, pp. 747-756
-
-
Bodei, C.1
Degano, P.2
Nielson, F.3
Nielson, H.4
-
33
-
-
84947418221
-
-
Bolignano, D.: Towards a mechanization of cryptographic protocol verification. In: Grumberg, O. (ed.) CAV 1997. LNCS, 1254, pp. 131-142. Springer, Heidelberg (1997)
-
Bolignano, D.: Towards a mechanization of cryptographic protocol verification. In: Grumberg, O. (ed.) CAV 1997. LNCS, vol. 1254, pp. 131-142. Springer, Heidelberg (1997)
-
-
-
-
34
-
-
0036308321
-
Proof techniques for cryptographic processes
-
Boreale, M., De Nicola, R., Pugliese, R.: Proof techniques for cryptographic processes. SIAM J. Comput. 31(3), 947-986 (2001)
-
(2001)
SIAM J. Comput
, vol.31
, Issue.3
, pp. 947-986
-
-
Boreale, M.1
De Nicola, R.2
Pugliese, R.3
-
35
-
-
35048863862
-
Symbolic bisimulation in the spi calculus
-
Gardner, P, Yoshida, N, eds, CONCUR 2004, Springer, Heidelberg
-
Borgström, J., Briais, S., Nestmann, U.: Symbolic bisimulation in the spi calculus. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol. 3170, pp. 161-176. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3170
, pp. 161-176
-
-
Borgström, J.1
Briais, S.2
Nestmann, U.3
-
36
-
-
84944052768
-
On bisimulations for the spi calculus
-
Kirchner, H, Ringeissen, C, eds, AMAST 2002, Springer, Heidelberg
-
Borgström, J., Nestmann, U.: On bisimulations for the spi calculus. In: Kirchner, H., Ringeissen, C. (eds.) AMAST 2002. LNCS, vol. 2422, pp. 287-303. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2422
, pp. 287-303
-
-
Borgström, J.1
Nestmann, U.2
-
37
-
-
0000523051
-
A logic of authentication
-
A preliminary version appeared as Digital Equipment Corporation Systems Research Center report, February
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proceedings of the Royal Society of London A 426, 233-271 (1989) (A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989)
-
(1989)
Proceedings of the Royal Society of London
, vol.A 426
, Issue.39
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
38
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. Journal of Computer Security 13(3), 423-482 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
39
-
-
33847655213
-
Protocol composition logic (PCL)
-
Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol composition logic (PCL). Electronic Notes in Theoretical Computer Science 172(1), 311-358 (2007)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.172
, Issue.1
, pp. 311-358
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Roy, A.4
-
40
-
-
84976671974
-
Cryptographic protocols
-
DeMillo, R.A., Lynch, N.A., Merritt, M.: Cryptographic protocols. In: 14th Annual ACM Symposium on Theory of Computing, pp. 383-400 (1982)
-
(1982)
14th Annual ACM Symposium on Theory of Computing
, pp. 383-400
-
-
DeMillo, R.A.1
Lynch, N.A.2
Merritt, M.3
-
41
-
-
84976665942
-
Timestamps in key distribution protocols
-
Denning, D.E., Sacco, G.M.: Timestamps in key distribution protocols. Communications of the ACM 24(7), 533-535 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.7
, pp. 533-535
-
-
Denning, D.E.1
Sacco, G.M.2
-
43
-
-
3543072509
-
A state-exploration technique for spi-calculus testingequivalence verification
-
Kluwer, Dordrecht
-
Durante, L., Sisto, R., Valenzano, A.: A state-exploration technique for spi-calculus testingequivalence verification. In: Formal Techniques for Distributed System Development, FORTE/PSTV. IFIP Conference Proceedings, vol. 183, pp. 155-170. Kluwer, Dordrecht (2000)
-
(2000)
Formal Techniques for Distributed System Development, FORTE/PSTV. IFIP Conference Proceedings
, vol.183
, pp. 155-170
-
-
Durante, L.1
Sisto, R.2
Valenzano, A.3
-
44
-
-
3042538976
-
Automatic testing equivalence verification of spi calculus specifications
-
Durante, L., Sisto, R., Valenzano, A.: Automatic testing equivalence verification of spi calculus specifications. ACM Transactions on Software Engineering and Methodology 12(2), 222-284 (2003)
-
(2003)
ACM Transactions on Software Engineering and Methodology
, vol.12
, Issue.2
, pp. 222-284
-
-
Durante, L.1
Sisto, R.2
Valenzano, A.3
-
45
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi, R., Gorrieri, R.: The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering 23(9), 550-571 (1997)
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
46
-
-
38049015738
-
-
Freier, A.O, Karlton, P, Kocher, P.C, The SSL protocol: Version 3.0 November 1996
-
Freier, A.O., Karlton, P., Kocher, P.C.: The SSL protocol: Version 3.0 (November 1996), http://www.mozilla.org/projects/security/pki/nss/ssl/draft302. txt
-
-
-
-
51
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
Cousot, R, ed, VMCAI 2005, Springer, Heidelberg
-
Goubault-Larrecq, J., Parrennes, F.: Cryptographic protocol analysis on real C code. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol. 3385, pp. 363-379. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
52
-
-
0030703956
-
Provable security for cryptographic protocols-exact analysis and engineering applications
-
Gray III, J.W., Ip, K.F.E., Lui, K.-S.: Provable security for cryptographic protocols-exact analysis and engineering applications. In: 10th IEEE Computer Security Foundations Workshop, pp. 45-58 (1997)
-
(1997)
10th IEEE Computer Security Foundations Workshop
, pp. 45-58
-
-
Gray III, J.W.1
Ip, K.F.E.2
Lui, K.-S.3
-
55
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Kemmerer, R.A., Meadows, C., Millen, J.K.: Three systems for cryptographic protocol analysis. Journal of Cryptology 7(2), 79-130 (1994)
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.A.1
Meadows, C.2
Millen, J.K.3
-
57
-
-
23144432349
-
-
Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 186-200. Springer, Heidelberg (2005)
-
Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186-200. Springer, Heidelberg (2005)
-
-
-
-
59
-
-
3543052976
-
Symmetric encryption in automatic analyses for confidentiality against active adversaries
-
May
-
Laud, P.: Symmetric encryption in automatic analyses for confidentiality against active adversaries. In: 2004 IEEE Symposium on Security and Privacy, pp. 71-85 (May 2004)
-
(2004)
2004 IEEE Symposium on Security and Privacy
, pp. 71-85
-
-
Laud, P.1
-
61
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
Lincoln, P., Mitchell, J., Mitchell, M., Scedrov, A.: A probabilistic poly-time framework for protocol analysis. In: 5th ACM Conference on Computer and Communications Security (CCS'98), pp. 112-121 (1998)
-
(1998)
5th ACM Conference on Computer and Communications Security (CCS'98)
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
62
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
63
-
-
33749070145
-
WSEmail: Secure internet messaging based on web services
-
Lux, K.D., May, M.J., Bhattad, N.L., Gunter, C.A.: WSEmail: Secure internet messaging based on web services. In: ICWS '05: Proceedings of the IEEE International Conference on Web Services, pp. 75-82 (2005)
-
(2005)
ICWS '05: Proceedings of the IEEE International Conference on Web Services
, pp. 75-82
-
-
Lux, K.D.1
May, M.J.2
Bhattad, N.L.3
Gunter, C.A.4
-
64
-
-
0032684740
-
I/O automaton models and proofs for shared-key communication systems
-
Lynch, N.: I/O automaton models and proofs for shared-key communication systems. In: 12th IEEE Computer Security Foundations Workshop, pp. 14-29 (1999)
-
(1999)
12th IEEE Computer Security Foundations Workshop
, pp. 14-29
-
-
Lynch, N.1
-
65
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
van Oorschot, P.C.2
Vanstone, S.A.3
-
66
-
-
0004256761
-
-
PhD thesis, Georgia Institute of Technology February
-
Merritt, M.J.: Cryptographic Protocols. PhD thesis, Georgia Institute of Technology (February 1983)
-
(1983)
Cryptographic Protocols
-
-
Merritt, M.J.1
-
67
-
-
35048899313
-
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
-
-
-
-
68
-
-
0003700417
-
Kerberos authentication and authorization system, Project Athena technical plan, section E.2.1
-
Technical report. MIT, Cambridge
-
Miller, S.P., Neuman, B.C., Schiller, J.I., Saltzer, J.H.: Kerberos authentication and authorization system, Project Athena technical plan, section E.2.1. Technical report. MIT, Cambridge (1987)
-
(1987)
-
-
Miller, S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
-
70
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, parts I and II. Information and Computation, 100, 1-40, 41-77 (1992)
-
(1992)
Information and Computation
, vol.100
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
71
-
-
85084160482
-
Finite-state analysis of SSL 3.0
-
January
-
Mitchell, J.C., Shmatikov, V., Stern, U.: Finite-state analysis of SSL 3.0. In: 7th USENIX Security Symposium, pp. 201-216 (January 1998)
-
(1998)
7th USENIX Security Symposium
, pp. 201-216
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
72
-
-
0037400687
-
Abstracting cryptographic protocols with tree automata
-
Monniaux, D.: Abstracting cryptographic protocols with tree automata. Science of Computer Programming 47(2-3), 177-202 (2003)
-
(2003)
Science of Computer Programming
, vol.47
, Issue.2-3
, pp. 177-202
-
-
Monniaux, D.1
-
74
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Communications of the ACM 21(12), 993-999 (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
76
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6(1-2), 85-128 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
77
-
-
35048876713
-
Probabilistic bisimulation and equivalence for security analysis of network protocols
-
Walukiewicz, I, ed, FOSSACS 2004, Springer, Heidelberg
-
Ramanathan, A., Mitchell, J., Scedrov, A., Teague, V.: Probabilistic bisimulation and equivalence for security analysis of network protocols. In: Walukiewicz, I. (ed.) FOSSACS 2004. LNCS, vol. 2987, pp. 468-483. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2987
, pp. 468-483
-
-
Ramanathan, A.1
Mitchell, J.2
Scedrov, A.3
Teague, V.4
-
79
-
-
0029721958
-
Limitations on design principles for public key protocols
-
Syverson, P.: Limitations on design principles for public key protocols. In: 1996 IEEE Symposium on Security and Privacy, pp. 62-73 (1996)
-
(1996)
1996 IEEE Symposium on Security and Privacy
, pp. 62-73
-
-
Syverson, P.1
-
80
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
May
-
Thayer Fábrega, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Why is a security protocol correct? In: 1998 IEEE Symposium on Security and Privacy, pp. 160-171 (May 1998)
-
(1998)
1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Thayer Fábrega, F.J.1
Herzog, J.C.2
Guttman, J.D.3
-
81
-
-
0026630927
-
Authentication for distributed systems
-
Woo, T.Y.C., Lam, S.S.: Authentication for distributed systems. Computer 25(1), 39-52 (1992)
-
(1992)
Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
82
-
-
0002508587
-
A lesson on authentication protocol design
-
Woo, T.Y.C., Lam, S.S.: A lesson on authentication protocol design. Operating Systems Review 28(3), 24-37 (1994)
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 24-37
-
-
Woo, T.Y.C.1
Lam, S.S.2
|