-
3
-
-
84955602379
-
Formal verification of cryptographic protocols: A survey
-
SafaviNaini, R, Pieprzyk, J.P, eds, ASIACRYPT 1994, Springer, Heidelberg
-
Meadows, C.A.: Formal verification of cryptographic protocols: A survey. In: SafaviNaini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, pp. 133-150. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.917
, pp. 133-150
-
-
Meadows, C.A.1
-
4
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transaction on Computer Systems 8/1, 18-36 (1990)
-
(1990)
ACM Transaction on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
84962060059
-
The logic of authentication protocols
-
Focardi, R, Gorrieri, R, eds, Foundations of Security Analysis and Design, Springer, Heidelberg
-
Syverson, P., Cervesato, I.: The logic of authentication protocols. In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design. LNCS, vol. 2171, pp. 63-137. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2171
, pp. 63-137
-
-
Syverson, P.1
Cervesato, I.2
-
8
-
-
0036836682
-
An intensive survey of fair non-repudiation protocols
-
Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocols. Computer Communications 25/17, 1606-1621 (2002)
-
(2002)
Computer Communications
, vol.25
, Issue.17
, pp. 1606-1621
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
9
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
Shmatikov, V., Mitchell, J.C.: Finite-state analysis of two contract signing protocols. Theoretical Computer Science 283, 419-450 (2002)
-
(2002)
Theoretical Computer Science
, vol.283
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
-
11
-
-
84979076059
-
Payword and Micromint: Two simple micropayment schemes
-
Lomas, M, ed, Security Protocols, Springer, Heidelberg
-
Rivest, R.L., Shamir, A.: Payword and Micromint: Two simple micropayment schemes. In: Lomas, M. (ed.) Security Protocols. LNCS, vol. 1189, pp. 69-87. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1189
, pp. 69-87
-
-
Rivest, R.L.1
Shamir, A.2
-
12
-
-
0023295108
-
The Interrogator: Protocol Security Analysis
-
Millen, J.K., Clark, S.C., Freedman, S.B.: The Interrogator: Protocol Security Analysis. IEEE Transactions on Software Engineering 13/2 (1987)
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
13
-
-
0039334690
-
Verifying security protocols with Brutus
-
Clarke, E.M., Jha, S., Marrero, W.: Verifying security protocols with Brutus. ACM Transactions on Software Engineering and Methodology 9/4, 443-487 (2000)
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
14
-
-
0030705405
-
Automated analysis of cryptographic protocols using Murφ
-
IEEE Computer Society, Los Alamitos
-
Mitchell, J.C., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using Murφ. In: Proc. of the IEEE Symposium on Research in Security and Privacy, pp. 141-153. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
Proc. of the IEEE Symposium on Research in Security and Privacy
, pp. 141-153
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
15
-
-
0029484376
-
Modeling and verifying key-exchange protocols using CSP and FDR
-
IEEE Computer Society, Los Alamitos
-
Roscoe, A.W.: Modeling and verifying key-exchange protocols using CSP and FDR. In: Proc. of the 8th IEEE Computer Security Foundations Workshop, pp. 98-107. IEEE Computer Society, Los Alamitos (1995)
-
(1995)
Proc. of the 8th IEEE Computer Security Foundations Workshop
, pp. 98-107
-
-
Roscoe, A.W.1
-
18
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
IEEE Computer Society, Los Alamitos
-
Lowe, G.: Casper: a compiler for the analysis of security protocols. In: Proc. of the IEEE Computer Security Foundations Workshop, pp. 18-30. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
Proc. of the IEEE Computer Security Foundations Workshop
, pp. 18-30
-
-
Lowe, G.1
-
19
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Meadows, C., Kemmerer, R., Millen, J.: Three systems for cryptographic protocol analysis. Journal of Cryptology 7/2, 79-130 (1994)
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Meadows, C.1
Kemmerer, R.2
Millen, J.3
-
20
-
-
0032623470
-
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
-
Gritzalis, S., Spinellis, D., Georgiadis, P.: Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications 22, 697-709 (1999)
-
(1999)
Computer Communications
, vol.22
, pp. 697-709
-
-
Gritzalis, S.1
Spinellis, D.2
Georgiadis, P.3
-
21
-
-
38349006963
-
-
Basin, D., Modersheim, S., Vigano, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security (2004)
-
Basin, D., Modersheim, S., Vigano, L.: OFMC: A Symbolic Model-Checker for Security Protocols. International Journal of Information Security (2004)
-
-
-
-
23
-
-
0031634547
-
Towards a completeness result for model-checking of Security Protocols
-
IEEE Computer Society Press, Los Alamitos
-
Lowe, G.: Towards a completeness result for model-checking of Security Protocols. In: Proc. of the 11th Computer Security Foundations Workshop, IEEE Computer Society Press, Los Alamitos (1998)
-
(1998)
Proc. of the 11th Computer Security Foundations Workshop
-
-
Lowe, G.1
-
24
-
-
38349018992
-
-
Clark, J, Jacob, J, A survey of authentication protocol literature: version 1.0, Technical Report, University of York 1997
-
Clark, J., Jacob, J.: A survey of authentication protocol literature: version 1.0, Technical Report, University of York (1997)
-
-
-
-
25
-
-
0033683193
-
How to prevent type flaw attacks on security protocols
-
IEEE Computer Society, Los Alamitos
-
Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. In: Proc. of the 13th IEEE Computer Security Foundations Workshop, pp. 255-268. IEEE Computer Society, Los Alamitos (2000)
-
(2000)
Proc. of the 13th IEEE Computer Security Foundations Workshop
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
26
-
-
85063324360
-
Cryptographic protocol flaws - Know your enemy
-
IEEE Computer Society, Los Alamitos
-
Carlsen, U.: Cryptographic protocol flaws - Know your enemy. In: Proc. of the 7th IEEE Computer Security Foundations Workshop, pp. 192-200. IEEE Computer Society, Los Alamitos (1994)
-
(1994)
Proc. of the 7th IEEE Computer Security Foundations Workshop
, pp. 192-200
-
-
Carlsen, U.1
-
27
-
-
0003602325
-
The MD5 Message-Digest Algorithm
-
RFC 1321
-
Rivest, R.L.: The MD5 Message-Digest Algorithm. In: Internet informational RFC 1321 (1992)
-
(1992)
Internet informational
-
-
Rivest, R.L.1
|