-
1
-
-
0003092378
-
A calculus for cryptographic protocols: the spi calculus
-
Abadi M., and Gordon A.D. A calculus for cryptographic protocols: the spi calculus. Inf. Comput. 1 148 (1999) 1-70
-
(1999)
Inf. Comput.
, vol.1
, Issue.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
40149096932
-
-
J. Alves-Foss, Provably insecure mutual authentication protocols: the two-party symmetric encryption case, in: Proceedings of National Information System Security Conference, October 1999, pp. 306-314.
-
J. Alves-Foss, Provably insecure mutual authentication protocols: the two-party symmetric encryption case, in: Proceedings of National Information System Security Conference, October 1999, pp. 306-314.
-
-
-
-
3
-
-
40149099690
-
Proving authentication properties in the Protocol Derivation Assistant
-
Degano P., Küsters R., and Vigano L. (Eds), ACM
-
Anlauff M., Pavlovic D., Waldinger R., and Westfold S. Proving authentication properties in the Protocol Derivation Assistant. In: Degano P., Küsters R., and Vigano L. (Eds). Proceedings of FCS-ARSPA 2006 (2006), ACM
-
(2006)
Proceedings of FCS-ARSPA 2006
-
-
Anlauff, M.1
Pavlovic, D.2
Waldinger, R.3
Westfold, S.4
-
4
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Proceedings of Computer Aided Verification'05 (CAV), Springer
-
Armando A., Basin D., Boichut Y., Chevalier Y., Compagna L., Cuellar L., Drielsma P.H., Heám P., Kouchnarenko O., Mantovani J., Mödersheim S., von Oheimb D., Rusinowitch M., Santiago J., Turuani M., Viganò L., and Vigneron L. The AVISPA tool for the automated validation of internet security protocols and applications. Proceedings of Computer Aided Verification'05 (CAV). Lecture Notes in Computer Science vol. 3576 (2005), Springer 281-285
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, L.6
Drielsma, P.H.7
Heám, P.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
5
-
-
33750447642
-
Compositional analysis of contract-signing protocols
-
Backes M., Datta A., Derek A., Mitchell J.C., and Turuani M. Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367 1-2 (2006) 33-56
-
(2006)
Theor. Comput. Sci.
, vol.367
, Issue.1-2
, pp. 33-56
-
-
Backes, M.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
Turuani, M.5
-
6
-
-
35248843428
-
On compositional reasoning in the spi-calculus
-
Proceedings of Fifth International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'02). Nielsen M., and Engberg U. (Eds), Springer
-
Boreale M., and Gorla D. On compositional reasoning in the spi-calculus. In: Nielsen M., and Engberg U. (Eds). Proceedings of Fifth International Conference on Foundations of Software Science and Computation Structures (FoSSaCS'02). LNCS vol. 2303 (2002), Springer 67-81
-
(2002)
LNCS
, vol.2303
, pp. 67-81
-
-
Boreale, M.1
Gorla, D.2
-
7
-
-
20444443229
-
-
M. Bugliesi, R. Focardi, M. Maffei, Authenticity by tagging and typing, in: FMSE '04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York, NY, USA, 2004, pp. 1-12.
-
M. Bugliesi, R. Focardi, M. Maffei, Authenticity by tagging and typing, in: FMSE '04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York, NY, USA, 2004, pp. 1-12.
-
-
-
-
8
-
-
21144444143
-
Compositional analysis of authentication protocols
-
Proceedings of the 13th European Symposium on Programming (ESOP). Schmidt D.A. (Ed), Springer
-
Bugliesi M., Focardi R., and Maffei M. Compositional analysis of authentication protocols. In: Schmidt D.A. (Ed). Proceedings of the 13th European Symposium on Programming (ESOP). Lecture Notes in Computer Science vol. 2986 (2004), Springer 140-154
-
(2004)
Lecture Notes in Computer Science
, vol.2986
, pp. 140-154
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
9
-
-
40149109132
-
-
M. Burrows, M. Abadi, R. Needham, A logic of authentication, in: Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996. Reprinted from the Proceedings of the Royal Society, vol. 426, No. 1871, 1989.
-
M. Burrows, M. Abadi, R. Needham, A logic of authentication, in: Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996. Reprinted from the Proceedings of the Royal Society, vol. 426, No. 1871, 1989.
-
-
-
-
10
-
-
2642523732
-
Environmental requirements for authentication protocols
-
Software Security-Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002. Okada M., Pierce B.C., Scedrov A., Tokuda H., and Yonezawa A. (Eds), Springer, Tokyo, Japan
-
Canetti R., Meadows C., and Syverson P. Environmental requirements for authentication protocols. In: Okada M., Pierce B.C., Scedrov A., Tokuda H., and Yonezawa A. (Eds). Software Security-Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002. Lecture Notes in Computer Science vol. 2609 (2002), Springer, Tokyo, Japan 339-355
-
(2002)
Lecture Notes in Computer Science
, vol.2609
, pp. 339-355
-
-
Canetti, R.1
Meadows, C.2
Syverson, P.3
-
11
-
-
40149098018
-
-
C.J.F. Cremers, Scyther: automatic verification of security protocols. Available from: .
-
C.J.F. Cremers, Scyther: automatic verification of security protocols. Available from: .
-
-
-
-
12
-
-
29244485874
-
-
C.J.F. Cremers, Compositionality of security protocols: a research agenda, in: F. Gadducci, M. ter Beek (Eds.), VODCA 2004, ENTCS, vol. 142(3), Bertinoro, Italy, 2006, pp. 99-110.
-
C.J.F. Cremers, Compositionality of security protocols: a research agenda, in: F. Gadducci, M. ter Beek (Eds.), VODCA 2004, ENTCS, vol. 142(3), Bertinoro, Italy, 2006, pp. 99-110.
-
-
-
-
13
-
-
33750936222
-
-
C.J.F. Cremers, Feasibility of multi-protocol attacks, in: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, Vienna, Austria, April 2006, pp. 287-294.
-
C.J.F. Cremers, Feasibility of multi-protocol attacks, in: Proceedings of the First International Conference on Availability, Reliability and Security (ARES), IEEE Computer Society Press, Vienna, Austria, April 2006, pp. 287-294.
-
-
-
-
14
-
-
40149088402
-
-
C.J.F. Cremers, Scyther-Semantics and Verification of Security Protocols, PhD Thesis, Eindhoven University of Technology, 2006, ISBN 90-386-0804-7. ISBN 978-90-386-0804-4.
-
C.J.F. Cremers, Scyther-Semantics and Verification of Security Protocols, PhD Thesis, Eindhoven University of Technology, 2006, ISBN 90-386-0804-7. ISBN 978-90-386-0804-4.
-
-
-
-
15
-
-
24944514681
-
-
C.J.F. Cremers, S. Mauw, Operational semantics of security protocols, in: S. Leue, T.J. Systä (Eds.), Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 post-seminar proceedings, September 7-12, 2003), Lecture Notes in Computer Science, vol. 3466, 2005, pp. 66-89.
-
C.J.F. Cremers, S. Mauw, Operational semantics of security protocols, in: S. Leue, T.J. Systä (Eds.), Scenarios: Models, Algorithms and Tools (Dagstuhl 03371 post-seminar proceedings, September 7-12, 2003), Lecture Notes in Computer Science, vol. 3466, 2005, pp. 66-89.
-
-
-
-
16
-
-
33750487822
-
-
C.J.F. Cremers, S. Mauw, E.P. de Vink, Injective synchronisation: an extension of the authentication hierarchy, Theor. Comput. Sci. 367(1-2) (2006) 139-161, in: P. Degano, L. Vigano (Eds.), Special issue on ARSPA'05.
-
C.J.F. Cremers, S. Mauw, E.P. de Vink, Injective synchronisation: an extension of the authentication hierarchy, Theor. Comput. Sci. 367(1-2) (2006) 139-161, in: P. Degano, L. Vigano (Eds.), Special issue on ARSPA'05.
-
-
-
-
18
-
-
2642548302
-
-
A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Secure protocol composition, in: FMSE '03: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York, NY, USA, 2003, pp. 11-23.
-
A. Datta, A. Derek, J.C. Mitchell, D. Pavlovic, Secure protocol composition, in: FMSE '03: Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York, NY, USA, 2003, pp. 11-23.
-
-
-
-
19
-
-
0020720357
-
On the security of public key protocols
-
Dolev D., and Yao A.C. On the security of public key protocols. IEEE Trans. Inf. Theory IT-29 12 (1983) 198-208
-
(1983)
IEEE Trans. Inf. Theory
, vol.IT-29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
20
-
-
84958771675
-
-
R. Focardi, R. Gorrieri, Automatic compositional verification of some security properties, Lecture Notes in Computer Science, vol. 1055, 1996, pp. 166-186.
-
R. Focardi, R. Gorrieri, Automatic compositional verification of some security properties, Lecture Notes in Computer Science, vol. 1055, 1996, pp. 166-186.
-
-
-
-
21
-
-
0001439194
-
The compositional security checker: a tool for the verification of information flow security properties
-
Focardi R., and Gorrieri R. The compositional security checker: a tool for the verification of information flow security properties. IEEE Trans. Softw. Eng. 23 9 (1997) 550-571
-
(1997)
IEEE Trans. Softw. Eng.
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
22
-
-
0033714403
-
-
J.D. Guttman, F.J. Thayer, Protocol independence through disjoint encryption, in: PCSFW: Proceedings of the 13th Computer Security Foundations Workshop, IEEE Computer Society Press, 2000. Available from: .
-
J.D. Guttman, F.J. Thayer, Protocol independence through disjoint encryption, in: PCSFW: Proceedings of the 13th Computer Security Foundations Workshop, IEEE Computer Society Press, 2000. Available from: .
-
-
-
-
23
-
-
0037076868
-
Authentication tests and the structure of bundles
-
Guttman J.D., and Thayer F.J. Authentication tests and the structure of bundles. Theor. Comput. Sci. 283 2 (2001) 333-380
-
(2001)
Theor. Comput. Sci.
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Thayer, F.J.2
-
24
-
-
33745770376
-
A modular correctness proof of IEEE 802.11i and TLS
-
Atluri V., Meadows C., and Juels A. (Eds), ACM
-
He C., Sundararajan M., Datta A., Derek A., and Mitchell J.C. A modular correctness proof of IEEE 802.11i and TLS. In: Atluri V., Meadows C., and Juels A. (Eds). ACM Conference on Computer and Communications Security (2005), ACM 2-15
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 2-15
-
-
He, C.1
Sundararajan, M.2
Datta, A.3
Derek, A.4
Mitchell, J.C.5
-
25
-
-
0001924088
-
A model for secure protocols and their compositions
-
Heintze N., and Tygar J.D. A model for secure protocols and their compositions. IEEE Trans. Softw. Eng. 22 1 (1996) 16-30
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.1
, pp. 16-30
-
-
Heintze, N.1
Tygar, J.D.2
-
26
-
-
40149093053
-
-
IEEE, standard 802.16-2004, 2004.
-
IEEE, standard 802.16-2004, 2004.
-
-
-
-
27
-
-
40149083044
-
-
IEEE, standard 802.16e-2005, 2005.
-
IEEE, standard 802.16e-2005, 2005.
-
-
-
-
28
-
-
3042685819
-
Overview of IEEE 802.16 security
-
Johnston D., and Walker J. Overview of IEEE 802.16 security. IEEE Security Privacy 2 3 (2004) 40-48
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.3
, pp. 40-48
-
-
Johnston, D.1
Walker, J.2
-
29
-
-
84955617577
-
-
J. Jürjens, Composability of secrecy, in: V. Gorodetski, V. Skormin, L. Popyack (Eds.), International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001), Lecture Notes in Computer Science, vol. 2052. Springer, St. Petersburg, May 2001, pp. 28-38.
-
J. Jürjens, Composability of secrecy, in: V. Gorodetski, V. Skormin, L. Popyack (Eds.), International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS 2001), Lecture Notes in Computer Science, vol. 2052. Springer, St. Petersburg, May 2001, pp. 28-38.
-
-
-
-
30
-
-
40149094724
-
-
E. Kaasenbrood, WiMAX security-a formal and informal analysis, Master's project, Eindhoven University of Technology, Department of Mathematics and Computer Science, 2006.
-
E. Kaasenbrood, WiMAX security-a formal and informal analysis, Master's project, Eindhoven University of Technology, Department of Mathematics and Computer Science, 2006.
-
-
-
-
31
-
-
84956985093
-
Protocol interactions and the chosen protocol attack
-
Proceedings of the Fifth International Workshop on Security Protocols. Christianson B., Crispo B., Lomas T.M.A., and Roe M. (Eds), Springer, London, UK
-
Kelsey J., Schneier B., and Wagner D. Protocol interactions and the chosen protocol attack. In: Christianson B., Crispo B., Lomas T.M.A., and Roe M. (Eds). Proceedings of the Fifth International Workshop on Security Protocols. Lecture Notes in Computer Science vol. 1361 (1998), Springer, London, UK 91-104
-
(1998)
Lecture Notes in Computer Science
, vol.1361
, pp. 91-104
-
-
Kelsey, J.1
Schneier, B.2
Wagner, D.3
-
32
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proceedings of TACAS, Springer
-
Lowe G. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Proceedings of TACAS. Lecture Notes in Computer Science vol. 1055 (1996), Springer 147-166
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
33
-
-
18444385411
-
-
M. Maffei, Tags for multi-protocol authentication, in: Proceedings of the Second International Workshop on Security Issues in Coordination Models, Languages, and Systems, Electronic Notes in Theoretical Computer Science, vol. 128(5), Elsevier ScienceDirect, August 2005, pp. 55-63.
-
M. Maffei, Tags for multi-protocol authentication, in: Proceedings of the Second International Workshop on Security Issues in Coordination Models, Languages, and Systems, Electronic Notes in Theoretical Computer Science, vol. 128(5), Elsevier ScienceDirect, August 2005, pp. 55-63.
-
-
-
-
35
-
-
0032630725
-
Analysis of the internet key exchange protocol using the NRL protocol analyzer
-
IEEE Computer Society
-
Meadows C. Analysis of the internet key exchange protocol using the NRL protocol analyzer. Proceedings of the 20th IEEE Symposium on Security & Privacy (1999), IEEE Computer Society 216-231
-
(1999)
Proceedings of the 20th IEEE Symposium on Security & Privacy
, pp. 216-231
-
-
Meadows, C.1
-
36
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Computer Society Press
-
Meadows C. Open issues in formal methods for cryptographic protocol analysis. Proceedings of DISCEX 2004 (2000), IEEE Computer Society Press 237-250
-
(2000)
Proceedings of DISCEX 2004
, pp. 237-250
-
-
Meadows, C.1
-
37
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Commun. ACM 21 2 (1978) 120-126
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Needham, R.1
Schroeder, M.2
-
38
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. The inductive approach to verifying cryptographic protocols. J. Comput. Secur. 6 1-2 (1998) 85-128
-
(1998)
J. Comput. Secur.
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
39
-
-
33645269120
-
Concurrency verification. Introduction to compositional and noncompositional methods
-
Cambridge University Press, Cambridge, UK
-
de Roever W.P., Hanneman U., Hooiman J., Lakhneche Y., Poel M., Zwiers J., and de Boer F. Concurrency verification. Introduction to compositional and noncompositional methods. Cambridge Tracts in Theoretical Computer Science vol. 54 (2001), Cambridge University Press, Cambridge, UK
-
(2001)
Cambridge Tracts in Theoretical Computer Science
, vol.54
-
-
de Roever, W.P.1
Hanneman, U.2
Hooiman, J.3
Lakhneche, Y.4
Poel, M.5
Zwiers, J.6
de Boer, F.7
-
40
-
-
40149104775
-
-
O. Sheyner, J. Wing, Composing proofs of security protocols using Isabelle/IOA, August 2000, in: Proceedings of the Theorem Proving for Higher Order Logics (TPHOLs) Workshop, Short Paper.
-
O. Sheyner, J. Wing, Composing proofs of security protocols using Isabelle/IOA, August 2000, in: Proceedings of the Theorem Proving for Higher Order Logics (TPHOLs) Workshop, Short Paper.
-
-
-
-
41
-
-
85176677157
-
-
F.J. Thayer, J.C. Herzog, J.D. Guttman, Strand spaces: why is a security protocol correct?, in: Proceedings of 1998 IEEE Symposium on Security and Privacy, Oakland, CA, 1998, pp. 66-77.
-
F.J. Thayer, J.C. Herzog, J.D. Guttman, Strand spaces: why is a security protocol correct?, in: Proceedings of 1998 IEEE Symposium on Security and Privacy, Oakland, CA, 1998, pp. 66-77.
-
-
-
-
43
-
-
47249121362
-
-
S. Xu, C.-T. Huang, Attacks on PKM protocols of IEEE 802.16 and its later versions, in: Proceedings of Third International Symposium on Wireless Communication Systems (ISWCS 2006), Valencia, Spain, 2006.
-
S. Xu, C.-T. Huang, Attacks on PKM protocols of IEEE 802.16 and its later versions, in: Proceedings of Third International Symposium on Wireless Communication Systems (ISWCS 2006), Valencia, Spain, 2006.
-
-
-
-
44
-
-
34248381676
-
-
S. Xu, M.M. Matthews, C.-T. Huang, Security issues in privacy and key management protocols of IEEE 802.16, in: Proceedings of the 44th ACM Southeast Conference (ACMSE 2006), Melbourne, FL, USA, 2006.
-
S. Xu, M.M. Matthews, C.-T. Huang, Security issues in privacy and key management protocols of IEEE 802.16, in: Proceedings of the 44th ACM Southeast Conference (ACMSE 2006), Melbourne, FL, USA, 2006.
-
-
-
|