-
1
-
-
84957795309
-
-
Abadi, M.: Private Authentication. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 27-40. Springer, Heidelberg (2003)
-
Abadi, M.: Private Authentication. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 27-40. Springer, Heidelberg (2003)
-
-
-
-
2
-
-
1642287221
-
-
RFC3971
-
Arkko, J., Kempf, J., Zill, B., Nikander, P.: RFC3971 - SEcure Neighbor Discovery (SEND) (March 2005)
-
(2005)
SEcure Neighbor Discovery (SEND) (March
-
-
Arkko, J.1
Kempf, J.2
Zill, B.3
Nikander, P.4
-
3
-
-
26444497860
-
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., Heàm, P.C., Mantovani, J., Moedersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005), http://www.avispa-project.org
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., Heàm, P.C., Mantovani, J., Moedersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005), http://www.avispa-project.org
-
-
-
-
5
-
-
18744415053
-
Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols
-
ACM Press, New York
-
Basin, D., Mödersheim, S., Viganò, L.: Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In: CCS'03. Proceedings of CCS'03, pp. 335-344. ACM Press, New York (2003)
-
(2003)
CCS'03. Proceedings of CCS'03
, pp. 335-344
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
6
-
-
33646262130
-
-
Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), 3835, pp. 549-564. Springer, Heidelberg (2005)
-
Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835, pp. 549-564. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
19744367735
-
-
Basin, D., Mödersheim, S., Viganò, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security 4(3), 181-208 (2005)
-
Basin, D., Mödersheim, S., Viganò, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security 4(3), 181-208 (2005)
-
-
-
-
8
-
-
84945119254
-
Entity authentication and key distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
10
-
-
0002980080
-
-
Work in Progress Internet Draft, June
-
Bradner, S., Mankin, A., Schiller, J.I.: A framework for purpose built keys (PBK), Work in Progress (Internet Draft) (June 2003)
-
(2003)
A framework for purpose built keys (PBK)
-
-
Bradner, S.1
Mankin, A.2
Schiller, J.I.3
-
11
-
-
23144433992
-
A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols
-
Austrian Computer Society
-
Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., Mantovani, J., Mödersheim, S., Vigneron, L.: A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In: Proceedings of SAPS'04, pp. 193-205. Austrian Computer Society (2004)
-
(2004)
Proceedings of SAPS'04
, pp. 193-205
-
-
Chevalier, Y.1
Compagna, L.2
Cuellar, J.3
Hankes Drielsma, P.4
Mantovani, J.5
Mödersheim, S.6
Vigneron, L.7
-
12
-
-
38049123287
-
-
Dierks, T., Allen, C.: RFC2246 - The TLS Protocol Version 1 (January 1999)
-
Dierks, T., Allen, C.: RFC2246 - The TLS Protocol Version 1 (January 1999)
-
-
-
-
15
-
-
38049134169
-
-
Johnson, D., Perkins, C., Arkko, J.: RFC3775 - Mobility Support in IPv6 (June 2004)
-
Johnson, D., Perkins, C., Arkko, J.: RFC3775 - Mobility Support in IPv6 (June 2004)
-
-
-
-
16
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society Press, Los Alamitos
-
Lowe, G.: A hierarchy of authentication specifications. In: Proceedings of CSFW'97, pp. 31-43. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
Proceedings of CSFW'97
, pp. 31-43
-
-
Lowe, G.1
|