-
1
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications. volume 3576 of
-
Springer-Verlag
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, L. Cuellar, P. Drielsma, P. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA tool for the automated validation of internet security protocols and applications. volume 3576 of Lecture Notes in Computer Science, pages 281-285. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, L.6
Drielsma, P.7
Héam, P.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
2
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
Computer Security - ESORICS 2003
-
D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In ESORICS, volume 2808 of Lecture Notes in Computer Science, pages 253-270. Springer-Verlag, 2003. (Pubitemid 37311874)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2808
, pp. 253-270
-
-
Basin, D.1
Modersheim, S.2
Vigano, L.3
-
3
-
-
84945119254
-
Entity authentication and key distribution
-
New York, NY, USA, Springer-Verlag
-
M. Bellare and P. Rogaway. Entity authentication and key distribution. In CRYPTO '93: Proceedings of the 13th annual international cryptology conference on Advances in cryptology, pages 232-249, New York, NY, USA, 1994. Springer-Verlag.
-
(1994)
CRYPTO '93: Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96. IEEE Computer Society, 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 82-96
-
-
Blanchet, B.1
-
5
-
-
38049082991
-
A generalization of DDH with applications to protocol analysis and computational soundness
-
A. J. Menezes, editor, of Lecture Notes in Computer Science, Springer-Verlag, August
-
E. Bresson, Y. Lakhnech, L. Mazaré, and B. Warinschi. A generalization of DDH with applications to protocol analysis and computational soundness. In A. J. Menezes, editor, Proc. of Crypto '07, volume 4622 of Lecture Notes in Computer Science, pages 482-499. Springer-Verlag, August 2007.
-
(2007)
Proc. of Crypto '07
, vol.4622
, pp. 482-499
-
-
Bresson, E.1
Lakhnech, Y.2
Mazaré, L.3
Warinschi, B.4
-
6
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8 (1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
10
-
-
34548864135
-
A derivation system for security protocols and its logical formalization
-
IEEE Computer Society
-
A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. A derivation system for security protocols and its logical formalization. In Proc. 16th IEEE Computer Security Foundations Workshop (CSFW), pages 109-125. IEEE Computer Society, 2003.
-
(2003)
Proc. 16th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 109-125
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Pavlovic, D.4
-
11
-
-
4944226639
-
Abstraction and refinement in protocol derivation
-
Washington, DC, USA, June, IEEE Computer Society
-
A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. Abstraction and refinement in protocol derivation. In Proc. 17th IEEE Computer Security Foundations Workshop (CSFW), pages 30-45, Washington, DC, USA, June 2004. IEEE Computer Society.
-
(2004)
Proc. 17th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 30-45
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Pavlovic, D.4
-
12
-
-
24144437949
-
Secure protocol composition
-
Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics
-
A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. Secure protocol composition. Electron. Notes Theor. Comput. Sci., 83, 2004. Proceedings of 19th Annual Conference on Mathematical Foundations of Programming Semantics.
-
Electron. Notes Theor. Comput. Sci.
, vol.83
, pp. 2004
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Pavlovic, D.4
-
13
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
A. Datta, A. Derek, J. Mitchell, and D. Pavlovic. A derivation system and compositional logic for security protocols. Journal of Computer Security, 13 (3):423-482, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Pavlovic, D.4
-
14
-
-
33847655213
-
Protocol Composition Logic (PCL)
-
Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin. Editors: L. Cardelli, M. Fiore, and G
-
A. Datta, A. Derek, J. Mitchell, and A. Roy. Protocol Composition Logic (PCL). Electron. Notes Theor. Comput. Sci., 172:311-358, 2007. Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin. Editors: L. Cardelli, M. Fiore, and G.
-
(2007)
Electron. Notes Theor. Comput. Sci.
, vol.172
, pp. 311-358
-
-
Datta, A.1
Derek, A.2
Mitchell, J.3
Roy, A.4
|