-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Expanded version available as SRC Research Report 149 (January 1998)
-
M. Abadi and A. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 143:1-70, 1999. Expanded version available as SRC Research Report 149 (January 1998).
-
(1999)
Information and Computation
, vol.143
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.2
-
2
-
-
0026154452
-
The existence ofrefinement mappings
-
M. Abadi and L.Lamport. The existence ofrefinement mappings. Theoretical Computer Science, 82(2):253-284, 1991.
-
(1991)
Theoretical Computer Science
, vol.82
, Issue.2
, pp. 253-284
-
-
Abadi, M.1
Lamport, L.2
-
3
-
-
84954417747
-
XOR MAC's: New methods for message authentication using finite pseudorandom functions
-
CRYPTO'95
-
M. Bellare, R. Guerin, and P. Rogaway. XOR MAC's: New methods for message authentication using finite pseudorandom functions. CRYPTO'95, Lecture Notes in Computer Science, 963, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
-
-
Bellare, M.1
Guerin, R.2
Rogaway, P.3
-
4
-
-
0001801746
-
Protocol verification as a hardware design aid
-
D. L. Dill, A. J. Drexler, A. J. Hu, and C. H. Yang. Protocol verification as a hardware design aid. In IEEE International Conference on Computer Design: VLSI in Computers and Processors, pages 522-5, 1992.
-
(1992)
IEEE International Conference on Computer Design: VLSI in Computers and Processors
, pp. 522-525
-
-
Dill, D.L.1
Drexler, A.J.2
Hu, A.J.3
Yang, C.H.4
-
6
-
-
0000877763
-
A type system for object initialization in the java bytecode language
-
Nov
-
S. Freund and J. Mitchell. A type system for object initialization in the java bytecode language. ACM Transactions on Programming Languages and Systems, 21(6):1196-1250, Nov. 1999.
-
(1999)
ACM Transactions on Programming Languages and Systems
, vol.21
, Issue.6
, pp. 1196-1250
-
-
Freund, S.1
Mitchell, J.2
-
7
-
-
84955507265
-
Caches and merkle trees for efficient memory authentication
-
B. Gassend, E. Suh, D. Clarke, M. van Dijk, and S. Devadas. Caches and merkle trees for efficient memory authentication. In Ninth International Symposium on High Performance Computer Architecture, pages 295-306, 2003.
-
(2003)
Ninth International Symposium on High Performance Computer Architecture
, pp. 295-306
-
-
Gassend, B.1
Suh, E.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
-
8
-
-
85084163735
-
The design ofa cryptographic security architecture
-
P. Gutmann. The design ofa cryptographic security architecture. In The Usenix Security Symposium, 1999.
-
(1999)
The Usenix Security Symposium
-
-
Gutmann, P.1
-
14
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
Nov
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz. Architectural support for copy and tamper resistant software. In Proceedings of the 9th International Conference Architectural Support for Programming Languages and Operating Systems, pages 168-177, Nov. 2000.
-
(2000)
Proceedings of the 9th International Conference Architectural Support for Programming Languages and Operating Systems
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
15
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
M. Reiter, editor, San Francisco, California, ACM Press
-
P. Lincoln, M. Mitchell, J. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In M. Reiter, editor, Proc. 5-th ACM Conference on Computer and Communications Security, pages 112-121, San Francisco, California, 1998. ACM Press.
-
(1998)
Proc. 5-th ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, M.2
Mitchell, J.3
Scedrov, A.4
-
19
-
-
0029484376
-
Modelling and verifying key-exchange protocols using CSP and FDR
-
IEEE Computer Soc Press
-
A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR. In CSFW VIII, page 98. IEEE Computer Soc Press, 1995.
-
(1995)
CSFW VIII
, pp. 98
-
-
Roscoe, A.W.1
-
23
-
-
3543097095
-
Validating a high-performance, programmable secure coprocessor
-
Oct
-
S. Smith, R. Perez, S. Weingart, and V. Austel. Validating a high-performance, programmable secure coprocessor. In Proceedings of the22nd National Information Systems Security Conference, Oct. 1999.
-
(1999)
Proceedings of The22nd National Information Systems Security Conference
-
-
Smith, S.1
Perez, R.2
Weingart, S.3
Austel, V.4
-
24
-
-
84958045366
-
Using a high-performance, programmable secure coprocessor
-
Feb
-
S. W. Smith, E. R. Palmer, and S. Weingart. Using a high-performance, programmable secure coprocessor. In Financial Cryptography, pages 73-89, Feb. 1998.
-
(1998)
Financial Cryptography
, pp. 73-89
-
-
Smith, S.W.1
Palmer, E.R.2
Weingart, S.3
|