-
1
-
-
13244299564
-
-
RFC 3748
-
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J.: Extensible Authentication Protocol. RFC 3748 (2004)
-
(2004)
Extensible Authentication Protocol
-
-
Aboba, B.1
Blunk, L.2
Vollbrecht, J.3
Carlson, J.4
-
3
-
-
26444565771
-
Probabilistic polynomial-time semantics for a protocol security logic
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Datta, A., Derek, A., Mitchell, J.C., Shmatikov, V., Turuani, M.: Probabilistic polynomial-time semantics for a protocol security logic. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 16-29. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 16-29
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Shmatikov, V.4
Turuani, M.5
-
4
-
-
33947704230
-
Computationally sound compositional logic for key exchange protocols
-
IEEE, Los Alamitos
-
Datta, A., Derek, A., Mitchell, J.C., Warinschi, B.: Computationally sound compositional logic for key exchange protocols. In: Proceedings of 19th IEEE Computer Security Foundations Workshop, pp. 321-334. IEEE, Los Alamitos (2006)
-
(2006)
Proceedings of 19th IEEE Computer Security Foundations Workshop
, pp. 321-334
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Warinschi, B.4
-
5
-
-
45749101257
-
-
Dill, D.L.: The Murφ Verification System. In: Alur, R., Henzinger, T.A. (eds.) CAV 1996. LNCS, 1102, pp. 147-158. Springer, Heidelberg (1996)
-
Dill, D.L.: The Murφ Verification System. In: Alur, R., Henzinger, T.A. (eds.) CAV 1996. LNCS, vol. 1102, pp. 147-158. Springer, Heidelberg (1996)
-
-
-
-
6
-
-
0030705405
-
Automated Analysis of Cryptographic Protocols Using Murφ
-
Mitchell, J.C., Mitchell, M., Stern, U.: Automated Analysis of Cryptographic Protocols Using Murφ. In: IEEE Symposium on Security and Privacy, pp. 141-151 (1997)
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 141-151
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
7
-
-
85084160482
-
Finite-State Analysis of SSL 3.0
-
Berkeley, CA, USA, pp, USENIX Association
-
Mitchell, J.C., Shmatikov, V., Stern, U.: Finite-State Analysis of SSL 3.0. In: SSYM 1998: Proceedings of the 7th conference on USENIX Security Symposium, 1998, Berkeley, CA, USA, pp. 16-16. USENIX Association (1998)
-
(1998)
SSYM 1998: Proceedings of the 7th conference on USENIX Security Symposium
, pp. 16-16
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
9
-
-
33847655213
-
Protocol Composition Logic (PCL)
-
Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol Composition Logic (PCL). Electron. Notes Theor. Comput. Sci. 172, 311-358 (2007)
-
(2007)
Electron. Notes Theor. Comput. Sci
, vol.172
, pp. 311-358
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Roy, A.4
-
11
-
-
0003777431
-
-
Addison-Wesley Publishing Co, Reading
-
Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, A.: Modelling and Analysis of Security Protocols. Addison-Wesley Publishing Co., Reading (2000)
-
(2000)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, A.5
-
12
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
Oakland, CA, pp, IEEE Computer Society Press, Los Alamitos
-
Fábrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand spaces: Why is a security protocol correct? In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 160-171. IEEE Computer Society Press, Los Alamitos (1998)
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
13
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85-128 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
14
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
Quisquater, J.-J, Deswarte, Y, Meadows, C, Gollmann, D, eds, ESORICS 1998, Springer, Heidelberg
-
Bella, G., Paulson, L.C.: Kerberos version IV: Inductive analysis of the secrecy goals. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 361-375. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
15
-
-
84948759231
-
A Formal Analysis of Some Properties of Kerberos 5 UsingMSR
-
NS, Canada, pp, IEEE Computer Society Press, Los Alamitos
-
Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: A Formal Analysis of Some Properties of Kerberos 5 UsingMSR. In: Fifteenth Computer SecurityFoundationsWorkshop - CSFW-15, Cape Breton, NS, Canada, pp. 175-190. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Fifteenth Computer SecurityFoundationsWorkshop - CSFW-15, Cape Breton
, pp. 175-190
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.D.3
Scedrov, A.4
-
16
-
-
35048902360
-
-
Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: Verifying confidentiality and authentication in kerberos 5. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, 3233, pp. 1-24. Springer, Heidelberg (2004)
-
Butler, F., Cervesato, I., Jaggard, A.D., Scedrov, A.: Verifying confidentiality and authentication in kerberos 5. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, vol. 3233, pp. 1-24. Springer, Heidelberg (2004)
-
-
-
-
17
-
-
45749139648
-
-
Cervesato, I, Jaggard, A, Scedrov, A, Tsay, J.K, Walstad, C, Breaking and fixing public-key kerberos Technical report
-
Cervesato, I., Jaggard, A., Scedrov, A., Tsay, J.K., Walstad, C.: Breaking and fixing public-key kerberos (Technical report)
-
-
-
-
18
-
-
28144435566
-
An encapsulated authentication logic for reasoning about key distribution
-
Los Alamitos
-
Cervasato, I., Meadows, C., Pavlovic, D.: An encapsulated authentication logic for reasoning about key distribution. In: CSFW-18, IEEE Computer Society, Los Alamitos (2005)
-
(2005)
CSFW-18, IEEE Computer Society
-
-
Cervasato, I.1
Meadows, C.2
Pavlovic, D.3
-
19
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. Journal of Computer Security 13, 423-482 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
20
-
-
30844456588
-
Non-monotonic properties for proving correctness in a framework of compositional logic
-
Hasebe, K., Okada, M.: Non-monotonic properties for proving correctness in a framework of compositional logic. In: Foundations of Computer Security Workshop, pp. 97-113 (2004)
-
(2004)
Foundations of Computer Security Workshop
, pp. 97-113
-
-
Hasebe, K.1
Okada, M.2
-
21
-
-
30844436780
-
-
Hasebe, K., Okada, M.: Inferences on honesty in compositional logic for security analysis. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, 3233, pp. 65-86. Springer, Heidelberg (2004)
-
Hasebe, K., Okada, M.: Inferences on honesty in compositional logic for security analysis. In: Futatsugi, K., Mizoguchi, F., Yonezaki, N. (eds.) ISSS 2003. LNCS, vol. 3233, pp. 65-86. Springer, Heidelberg (2004)
-
-
-
-
22
-
-
33745770376
-
A modular correctness proof of ieee 802.11i and tls
-
He, C., Sundararajan, M., Datta, A., Derek, A., Mitchell, J.C.: A modular correctness proof of ieee 802.11i and tls. In: ACM Conference on Computer and Communications Security, pp. 2-15 (2005)
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 2-15
-
-
He, C.1
Sundararajan, M.2
Datta, A.3
Derek, A.4
Mitchell, J.C.5
-
23
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Abadi, M., Rogaway, P.: Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology 15, 103-127 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
24
-
-
32844458560
-
A universally composable cryptographic library. Cryptology ePrint Archive
-
Report 2003/015
-
Backes, M., Pfitzmann, B., Waidner, M.: A universally composable cryptographic library. Cryptology ePrint Archive, Report 2003/015 (2003)
-
(2003)
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
25
-
-
26444541858
-
Computationally Sound Implementations of Equational Theories against Passive Adversaries
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Baudet, M., Cortier, V., Kremer, S.: Computationally Sound Implementations of Equational Theories against Passive Adversaries. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 652-663. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 652-663
-
-
Baudet, M.1
Cortier, V.2
Kremer, S.3
-
26
-
-
33745528593
-
-
Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876, pp. 380-403. Springer, Heidelberg (2006)
-
Canetti, R., Herzog, J.: Universally composable symbolic analysis of mutual authentication and key-exchange protocols. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 380-403. Springer, Heidelberg (2006)
-
-
-
-
28
-
-
28144460109
-
Computational and information-theoretic soundness and completeness of formal encryption
-
Adão, P., Bana, G., Scedrov, A.: Computational and information-theoretic soundness and completeness of formal encryption. CSFW 18, 170-184 (2005)
-
(2005)
CSFW
, vol.18
, pp. 170-184
-
-
Adão, P.1
Bana, G.2
Scedrov, A.3
-
29
-
-
35048899313
-
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
-
-
-
-
30
-
-
84942255620
-
A computational analysis of the Needham-Schroeder(-Lowe) protocol
-
ACM Press, New York
-
Warinschi, B.: A computational analysis of the Needham-Schroeder(-Lowe) protocol. In: Proceedings of 16th Computer Science Foundation Workshop, pp. 248-262. ACM Press, New York (2003)
-
(2003)
Proceedings of 16th Computer Science Foundation Workshop
, pp. 248-262
-
-
Warinschi, B.1
-
31
-
-
38049090664
-
Secrecy analysis in Protocol Composition Logic
-
to appear
-
Roy, A., Datta, A., Derek, A., Mitchell, J.C., Seifert, J.P.: Secrecy analysis in Protocol Composition Logic. In: Proceedings of 11th Annual Asian Computing Science Conference (to appear, 2006)
-
(2006)
Proceedings of 11th Annual Asian Computing Science Conference
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
Seifert, J.P.5
-
32
-
-
38049030237
-
Inductive proofs of computational secrecy
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Roy, A., Datta, A., Derek, A., Mitchell, J.C.: Inductive proofs of computational secrecy. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 219-234. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 219-234
-
-
Roy, A.1
Datta, A.2
Derek, A.3
Mitchell, J.C.4
-
33
-
-
41549086014
-
Formal proofs of cryptographic security of Diffie-Hellman-based protocols
-
3rd Symposium on Trustworthy Global Computing, TGC, Springer, Heidelberg
-
Roy, A., Datta, A., Mitchell, J.C.: Formal proofs of cryptographic security of Diffie-Hellman-based protocols. In: 3rd Symposium on Trustworthy Global Computing, TGC 2007. LNCS, vol. 4912, pp. 312-329. Springer, Heidelberg (2008)
-
(2007)
LNCS
, vol.4912
, pp. 312-329
-
-
Roy, A.1
Datta, A.2
Mitchell, J.C.3
-
34
-
-
45749144748
-
-
Roy, A., Datta, A., Derek, A., Mitchell, J.C.: Inductive trace properties for computational security. In: WITS (2007)
-
Roy, A., Datta, A., Derek, A., Mitchell, J.C.: Inductive trace properties for computational security. In: WITS (2007)
-
-
-
-
35
-
-
45749117572
-
-
Dierks, T, Rescorla, E, The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 2006
-
Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (2006)
-
-
-
-
36
-
-
0031619016
-
The random oracle methodology, revisited (preliminary version)
-
ACM, New York
-
Canetti, R., Goldreich, O., Halevi, S.: The random oracle methodology, revisited (preliminary version). In: STOC 1998: Proceedings of the thirtieth annual ACM symposium on Theory of computing, pp. 209-218. ACM, New York (1998)
-
(1998)
STOC 1998: Proceedings of the thirtieth annual ACM symposium on Theory of computing
, pp. 209-218
-
-
Canetti, R.1
Goldreich, O.2
Halevi, S.3
-
37
-
-
0034834930
-
A compositional logic for protocol correctness
-
IEEE, Los Alamitos
-
Durgin, N., Mitchell, J.C., Pavlovic, D.: A compositional logic for protocol correctness. In: Proceedings of 14th IEEE Computer Security Foundations Workshop, pp. 241-255. IEEE, Los Alamitos (2001)
-
(2001)
Proceedings of 14th IEEE Computer Security Foundations Workshop
, pp. 241-255
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
38
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
Durgin, N., Mitchell, J.C., Pavlovic, D.: A compositional logic for proving security properties of protocols. Journal of Computer Security 11, 677-721 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
39
-
-
34548864135
-
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system for security protocols and its logical formalization. In: CSFW-16, pp. 109-125. IEEE, Los Alamitos (2003)
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system for security protocols and its logical formalization. In: CSFW-16, pp. 109-125. IEEE, Los Alamitos (2003)
-
-
-
-
40
-
-
24144437949
-
Secure protocol composition
-
Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Secure protocol composition. In: Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics. Electronic Notes in Theoretical Computer Science, vol. 83 (2004)
-
(2004)
Electronic Notes in Theoretical Computer Science
, vol.83
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
41
-
-
4944226639
-
-
CSFW-17, pp, IEEE, Los Alamitos 2004
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Abstraction and refinement in protocol derivation. In: CSFW-17, pp. 30-45. IEEE, Los Alamitos (2004)
-
Abstraction and refinement in protocol derivation
, pp. 30-45
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
42
-
-
84945119254
-
Entity authentication and key distribution
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232-249. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
|