-
1
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE, Los Alamitos
-
Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pp. 82-96. IEEE, Los Alamitos (2001)
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 82-96
-
-
Blanchet, B.1
-
2
-
-
26444497860
-
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, L., Drielsma, P., Heám, P., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, L., Drielsma, P., Heám, P., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
24944514681
-
Operational semantics of security protocols
-
Leue, S, Systä, T.J, eds, Scenarios: Models, Transformations and Tools, Springer, Heidelberg
-
Cremers, C., Mauw, S.: Operational semantics of security protocols. In: Leue, S., Systä, T.J. (eds.) Scenarios: Models, Transformations and Tools. LNCS, vol. 3466, pp. 66-89. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3466
, pp. 66-89
-
-
Cremers, C.1
Mauw, S.2
-
6
-
-
33847679489
-
-
Doghmi, S., Guttman, J.D., Thayer, F.: Skeletons, homomorphisms, and shapes: Characterizing protocol executions. In: Proc. of the 23rd Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXIII). ENTCS, 173, pp. 85-102. Elsevier ScienceDirect, Amsterdam (2007)
-
Doghmi, S., Guttman, J.D., Thayer, F.: Skeletons, homomorphisms, and shapes: Characterizing protocol executions. In: Proc. of the 23rd Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXIII). ENTCS, vol. 173, pp. 85-102. Elsevier ScienceDirect, Amsterdam (2007)
-
-
-
-
9
-
-
48949092479
-
-
Cremers, C., Lafourcade, P.: Comparing state spaces in automatic protocol verification. In: Proc. of the 7th Int. Workshop on Automated Verification of Critical Systems (AVoCS 2007). ENTCS (September 2007) (to appear)
-
Cremers, C., Lafourcade, P.: Comparing state spaces in automatic protocol verification. In: Proc. of the 7th Int. Workshop on Automated Verification of Critical Systems (AVoCS 2007). ENTCS (September 2007) (to appear)
-
-
-
-
11
-
-
40149109757
-
A framework for compositional verification of security protocols
-
Andova, S., Cremers, C., Gjøsteen, K., Mauw, S., Mjølsnes, S., Radomirović, S.: A framework for compositional verification of security protocols. Information and Computation 206, 425-459 (2008)
-
(2008)
Information and Computation
, vol.206
, pp. 425-459
-
-
Andova, S.1
Cremers, C.2
Gjøsteen, K.3
Mauw, S.4
Mjølsnes, S.5
Radomirović, S.6
-
12
-
-
48949094875
-
On the protocol composition logic PCL
-
Abe, M, Gligor, V, eds, Tokyo, pp, ACM Press, New York
-
Cremers, C.: On the protocol composition logic PCL. In: Abe, M., Gligor, V. (eds.) Proc. of the ACM Symposium on Information, Computer & Communication Security (ASIACCS 2008), Tokyo, pp. 66-76. ACM Press, New York (2008)
-
(2008)
Proc. of the ACM Symposium on Information, Computer & Communication Security (ASIACCS
, pp. 66-76
-
-
Cremers, C.1
|