-
1
-
-
26444497860
-
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Héam, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, L. Vigneron, The AVISPA tool for the automated validation of internet security protocols and applications, in: CAV'05, 2005, pp. 281-285.
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Héam, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, L. Vigneron, The AVISPA tool for the automated validation of internet security protocols and applications, in: CAV'05, 2005, pp. 281-285.
-
-
-
-
2
-
-
40149097491
-
-
G. Denker, J. Millen, CAPSL intermediate language, in: Formal Methods and Security Protocols, 1999, pp. 1-10.
-
G. Denker, J. Millen, CAPSL intermediate language, in: Formal Methods and Security Protocols, 1999, pp. 1-10.
-
-
-
-
3
-
-
34047234972
-
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
-
Meseguer J., and Thati P. Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Journal of Higher-Order and Symbolic Computation 20 1-2 (2005) 123-160
-
(2005)
Journal of Higher-Order and Symbolic Computation
, vol.20
, Issue.1-2
, pp. 123-160
-
-
Meseguer, J.1
Thati, P.2
-
4
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6 1 (1998) 85-128
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.C.1
-
5
-
-
35248852076
-
A comparison between strand spaces and multiset rewriting for security protocol analysis
-
Proceedings of ISSS 2002, Springer-Verlag
-
Cervesato I., Durgin N., Lincoln P.D., Mitchell J.C., and Scedrov A. A comparison between strand spaces and multiset rewriting for security protocol analysis. Proceedings of ISSS 2002. LNCS 2609 (2003), Springer-Verlag 356-383
-
(2003)
LNCS 2609
, pp. 356-383
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
6
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
Abadi M., and Blanchet B. Analyzing security protocols with secrecy types and logic programs. Journal of the ACM 52 1 (2005) 102-146
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
7
-
-
35248860689
-
Security properties: two agents are sufficient
-
Proceedings of ESOP'2003, Springer-Verlag
-
Cortier V. Security properties: two agents are sufficient. Proceedings of ESOP'2003. LNCS 2618 (2003), Springer-Verlag 99-113
-
(2003)
LNCS 2618
, pp. 99-113
-
-
Cortier, V.1
-
8
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society Press
-
Blanchet B. An efficient cryptographic protocol verifier based on prolog rules. CSFW'01 (2001), IEEE Computer Society Press 82-96
-
(2001)
CSFW'01
, pp. 82-96
-
-
Blanchet, B.1
-
9
-
-
40149084533
-
-
Y. Boichut, P.-C. Héam, O. Kouchnarenko, F. Oehl, Improvements on the Genet and Klay technique to automatically verify security protocols, in: Automated Verification of Infinite-State Systems (AVIS'04), 2004, pp. 1-11.
-
Y. Boichut, P.-C. Héam, O. Kouchnarenko, F. Oehl, Improvements on the Genet and Klay technique to automatically verify security protocols, in: Automated Verification of Infinite-State Systems (AVIS'04), 2004, pp. 1-11.
-
-
-
-
11
-
-
84944038631
-
Automating data independence
-
Esorics 2000, Springer-Verlag
-
Broadfoot P., Lowe G., and Roscoe A. Automating data independence. Esorics 2000. LNCS 1895 (2000), Springer-Verlag 175-190
-
(2000)
LNCS 1895
, pp. 175-190
-
-
Broadfoot, P.1
Lowe, G.2
Roscoe, A.3
-
12
-
-
84937559950
-
-
Y. Chevalier, L. Vigneron, Automated unbounded verification of security protocols, in: CAV'02, LNCS 2404, 2002, pp. 324-337.
-
Y. Chevalier, L. Vigneron, Automated unbounded verification of security protocols, in: CAV'02, LNCS 2404, 2002, pp. 324-337.
-
-
-
-
13
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
CADE'00, Springer-Verlag
-
Genet T., and Klay F. Rewriting for cryptographic protocol verification. CADE'00. LNCS 1831 (2000), Springer-Verlag 271-290
-
(2000)
LNCS 1831
, pp. 271-290
-
-
Genet, T.1
Klay, F.2
-
14
-
-
40149103328
-
-
C. Weidenbach, Towards an automatic analysis of security protocols, in: CADE'99, LNCS 1632, Berlin, 1999, pp. 378-382.
-
C. Weidenbach, Towards an automatic analysis of security protocols, in: CADE'99, LNCS 1632, Berlin, 1999, pp. 378-382.
-
-
-
-
15
-
-
22344454117
-
Security protocols: from linear to classical logic by abstract interpretation
-
Blanchet B. Security protocols: from linear to classical logic by abstract interpretation. Information Processing Letters 95 5 (2005) 473-479
-
(2005)
Information Processing Letters
, vol.95
, Issue.5
, pp. 473-479
-
-
Blanchet, B.1
-
16
-
-
33646265822
-
Automatic approximation for the verification of cryptographic protocols
-
Formal Aspects of Security (FASec'02), Springer-Verlag
-
Oehl F., Gécé G., Kouchnarenko O., and Sinclair D. Automatic approximation for the verification of cryptographic protocols. Formal Aspects of Security (FASec'02). LNCS 2629 (2002), Springer-Verlag 33-48
-
(2002)
LNCS 2629
, pp. 33-48
-
-
Oehl, F.1
Gécé, G.2
Kouchnarenko, O.3
Sinclair, D.4
-
19
-
-
77956968984
-
-
P. Aczel, An introduction to inductive definitions, in: Handbook of Mathematical Logic, 1977, pp. 739-782.
-
P. Aczel, An introduction to inductive definitions, in: Handbook of Mathematical Logic, 1977, pp. 739-782.
-
-
-
-
21
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
ACM Press
-
Millen J.K., and Shmatikov V. Constraint solving for bounded-process cryptographic protocol analysis. CCS'01 (2001), ACM Press 166-175
-
(2001)
CCS'01
, pp. 166-175
-
-
Millen, J.K.1
Shmatikov, V.2
-
22
-
-
0030708255
-
-
G. Lowe, A hierarchy of authentication specifications, in: CSFW'97, 1997, pp. 31-43.
-
G. Lowe, A hierarchy of authentication specifications, in: CSFW'97, 1997, pp. 31-43.
-
-
-
-
23
-
-
0031650188
-
-
N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, 1998, pp. 86-99.
-
N. Asokan, V. Shoup, M. Waidner, Asynchronous protocols for optimistic fair exchange, in: Proceedings of the IEEE Symposium on Research in Security and Privacy, 1998, pp. 86-99.
-
-
-
-
24
-
-
40149112349
-
-
P. Hankes Drielsma, S. Mödersheim, The ASW protocol revisited: a unified view, in: ARSPA 2004, 2005, pp. 141-156.
-
P. Hankes Drielsma, S. Mödersheim, The ASW protocol revisited: a unified view, in: ARSPA 2004, 2005, pp. 141-156.
-
-
-
-
26
-
-
0033683607
-
-
J. Heather, S. Schneider, Towards automatic verification of authentication protocols on an unbounded network, in: CSFW 2000, 2000, pp. 132-143.
-
J. Heather, S. Schneider, Towards automatic verification of authentication protocols on an unbounded network, in: CSFW 2000, 2000, pp. 132-143.
-
-
-
-
27
-
-
33750487822
-
Injective synchronisation: an extension of the authentication hierarchy
-
Cremers C.J.F., Mauw S., and de Vink E.P. Injective synchronisation: an extension of the authentication hierarchy. Theoretical Computer Science 367 1 (2006) 139-161
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1
, pp. 139-161
-
-
Cremers, C.J.F.1
Mauw, S.2
de Vink, E.P.3
-
28
-
-
0001937830
-
A formal language for cryptographic protocol requirements
-
Special issue of Designs
-
Syverson P., and Meadows C. A formal language for cryptographic protocol requirements. Special issue of Designs. Codes and Cryptography 7 1-2 (1996) 27-59
-
(1996)
Codes and Cryptography
, vol.7
, Issue.1-2
, pp. 27-59
-
-
Syverson, P.1
Meadows, C.2
-
29
-
-
0002508587
-
A lesson on authenticated protocol design
-
Woo T., and Lam S. A lesson on authenticated protocol design. Operating Systems Review 28 (1997) 24-37
-
(1997)
Operating Systems Review
, vol.28
, pp. 24-37
-
-
Woo, T.1
Lam, S.2
-
30
-
-
3042559983
-
Abstraction and counterexample-guided refinement in model checking of hybrid systems
-
Clarke E., Fehnker A., Han Z., Krogh B., Ouaknine J., Stursberg O., and Theobald M. Abstraction and counterexample-guided refinement in model checking of hybrid systems. International Journal of Foundations of Computer Science 14 4 (2003) 583-604
-
(2003)
International Journal of Foundations of Computer Science
, vol.14
, Issue.4
, pp. 583-604
-
-
Clarke, E.1
Fehnker, A.2
Han, Z.3
Krogh, B.4
Ouaknine, J.5
Stursberg, O.6
Theobald, M.7
|