-
1
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18-36 (1990)
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
2
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Gong, L., Needham, R.M., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: IEEE Symposium on Security and Privacy, pp. 234-248 (1990)
-
(1990)
IEEE Symposium on Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.M.2
Yahalom, R.3
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Inf. Comput. 148(1), 1-70 (1999)
-
(1999)
Inf. Comput
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security 6(1-2), 53-84 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 53-84
-
-
Lowe, G.1
-
5
-
-
26444497860
-
-
Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.-C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
-
Armando, A., Basin, D.A., Boichut, Y., Chevalier, Y., Compagna, L., Cuéllar, J., Drielsma, P.H., Héam, P.-C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
-
-
-
-
6
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6(1-2), 85-128 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
7
-
-
0346955916
-
The coinductive approach to verifying cryptographic protocols
-
Wirsing, M, Pattinson, D, Hennicker, R, eds, Recent Trends in Algebraic Development Techniques, Springer, Heidelberg
-
Hughes, J., Warnier, M.: The coinductive approach to verifying cryptographic protocols. In: Wirsing, M., Pattinson, D., Hennicker, R. (eds.) Recent Trends in Algebraic Development Techniques. LNCS, vol. 2755, pp. 268-283. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2755
, pp. 268-283
-
-
Hughes, J.1
Warnier, M.2
-
8
-
-
38149002937
-
-
Gunter, E.L., Felty, A.P. (eds.): TPHOLs 1997. LNCS, 1275, pp. 19-22. Springer, Heidelberg (1997)
-
Gunter, E.L., Felty, A.P. (eds.): TPHOLs 1997. LNCS, vol. 1275, pp. 19-22. Springer, Heidelberg (1997)
-
-
-
-
9
-
-
19044390971
-
-
Denker, G., Millen, J.K.: Modeling group communication protocols using multiset term rewriting. Electr. Notes Theor. Comput. Sci., 71 (2002)
-
Denker, G., Millen, J.K.: Modeling group communication protocols using multiset term rewriting. Electr. Notes Theor. Comput. Sci., vol. 71 (2002)
-
-
-
-
10
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
McAlleste, D.A, ed, Automated Deduction, CADE-17, Springer, Heidelberg
-
Genet, T., Klay, F.: Rewriting for cryptographic protocol verification. In: McAlleste, D.A. (ed.) Automated Deduction - CADE-17. LNCS, vol. 1831, pp. 271-290. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1831
, pp. 271-290
-
-
Genet, T.1
Klay, F.2
-
11
-
-
1442316806
-
Pattern-based abstraction for verifying secrecy in protocols
-
Garavel, H, Hatcliff, J, eds, ETAPS 2003 and TACAS 2003, Springer, Heidelberg
-
Bozga, L., Lakhnech, Y., Périn, M.: Pattern-based abstraction for verifying secrecy in protocols. In: Garavel, H., Hatcliff, J. (eds.) ETAPS 2003 and TACAS 2003. LNCS, vol. 2619, pp. 299-314. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2619
, pp. 299-314
-
-
Bozga, L.1
Lakhnech, Y.2
Périn, M.3
-
12
-
-
0037400687
-
Abstracting cryptographic protocols with tree automata
-
Monniaux, D.: Abstracting cryptographic protocols with tree automata. Sci. Comput. Program. 47(2-3), 177-202 (2003)
-
(2003)
Sci. Comput. Program
, vol.47
, Issue.2-3
, pp. 177-202
-
-
Monniaux, D.1
-
13
-
-
4243317658
-
Conformance Testing Methodology and Framework
-
ISO/IEC 9646
-
ISO/IEC 9646. Conformance Testing Methodology and Framework (1992)
-
(1992)
-
-
-
15
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
Cousot, R, ed, VMCAI 2005, Springer, Heidelberg
-
Goubault-Larrecq, J., Parrennes, F.: Cryptographic protocol analysis on real C code. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol. 3385, pp. 363-379. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
17
-
-
38149094888
-
Testing the dutch e-passport
-
Technical report, Radboud University, Nijmegen, The Netherlands
-
Breunesse, C.-B., Hubbers, E., Koopman, P., Mostowski, W., Oostdijk, M., Rusu, V., de Vries, R., van Weelden, A., Schreur, R.W., Willemse, T.: Testing the dutch e-passport, Technical report, Radboud University, Nijmegen, The Netherlands (2006)
-
(2006)
-
-
Breunesse, C.-B.1
Hubbers, E.2
Koopman, P.3
Mostowski, W.4
Oostdijk, M.5
Rusu, V.6
de Vries, R.7
van Weelden, A.8
Schreur, R.W.9
Willemse, T.10
-
19
-
-
38149012143
-
-
Technical advisory group on Machine-Readable travel documents. Pki for machine-readable travel documents, version 1.1. Technical report, International Civil Aviation Organization October 2004
-
Technical advisory group on Machine-Readable travel documents. Pki for machine-readable travel documents, version 1.1. Technical report, International Civil Aviation Organization (October 2004)
-
-
-
-
20
-
-
0001383866
-
Introduction to IO automata
-
Lynch, N., Tuttle, M.: Introduction to IO automata. CWI Quarterly, vol. 3(2) (1999)
-
(1999)
CWI Quarterly
, vol.3
, Issue.2
-
-
Lynch, N.1
Tuttle, M.2
-
23
-
-
84928563923
-
-
Clavel, M., Durán, F., Eker, S., Lincoln, P., Marti-Oliet, N., Meseguer, J., Talcott, C.: The maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, 2706, pp. 76-87. Springer, Heidelberg (2003)
-
Clavel, M., Durán, F., Eker, S., Lincoln, P., Marti-Oliet, N., Meseguer, J., Talcott, C.: The maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 76-87. Springer, Heidelberg (2003)
-
-
-
-
24
-
-
0842331202
-
-
Gaudel, M.-C., James, P.R.: Testing algebraic data types and processes: A unifying theory. Formal Asp. Comput. 10(5-6), 436-451 (1998)
-
Gaudel, M.-C., James, P.R.: Testing algebraic data types and processes: A unifying theory. Formal Asp. Comput. 10(5-6), 436-451 (1998)
-
-
-
-
25
-
-
84976832596
-
Inference of reversible languages
-
Angluin, D.: Inference of reversible languages. Journal of the ACM 29(3), 741-765 (1982)
-
(1982)
Journal of the ACM
, vol.29
, Issue.3
, pp. 741-765
-
-
Angluin, D.1
|