-
1
-
-
0038687767
-
Efficient, DoS-resistant. Secure key exchange for internet protocols
-
ACM Press
-
W. Aiello, S. M. Bellovin, M. Blaze, J. Ioannidis, O. Reingold, R. Canetti, and A. D. Keromytis. Efficient, DoS-resistant. secure key exchange for internet protocols. In Proceedings of the 9th ACM conference on Computer and communications security, pages 48-58. ACM Press, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 48-58
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Ioannidis, J.4
Reingold, O.5
Canetti, R.6
Keromytis, A.D.7
-
2
-
-
4944258617
-
Just fast keying (JFK)
-
W. Aiello, S.M. Bellovin, M. Blaze, R. Canetti, A.D. Keromytis J. Ioannidis, and O. Reingold. Just fast keying (JFK), 2002. Internet draft.
-
(2002)
Internet Draft
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Keromytis, A.D.5
Ioannidis, J.6
Reingold, O.7
-
4
-
-
4944223564
-
On specification carrying software, its refinement and composition
-
H. Ehrig, B.J. Kramer, and A. Ertas, editors, Society for Design and Process Science
-
M. Anlauff and D. Pavlovic. On specification carrying software, its refinement and composition. In H. Ehrig, B.J. Kramer, and A. Ertas, editors, Proceedings of IDPT 2002. Society for Design and Process Science, 2002.
-
(2002)
Proceedings of IDPT 2002
-
-
Anlauff, M.1
Pavlovic, D.2
-
5
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd IEEE Symp. on the Foundations of Computer Science. IEEE, 2001. Full version available at http://eprint.iacr.org/2000/067/ .
-
(2001)
Proc. 42nd IEEE Symp. on the Foundations of Computer Science
-
-
Canetti, R.1
-
6
-
-
34548864135
-
A derivation system for security protocols and its logical formalization
-
IEEE
-
A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. A derivation system for security protocols and its logical formalization. In Proceedings of 16th IEEE Computer Security Foundations Workshop, pages 109-125. IEEE, 2003.
-
(2003)
Proceedings of 16th IEEE Computer Security Foundations Workshop
, pp. 109-125
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
8
-
-
2642548302
-
Secure protocol composition (Extended abstract)
-
A. Datta, A. Derek, J. C. Mitchell, and D. Pavlovic. Secure protocol composition (Extended abstract). In Proceedings of ACM Workshop on Formal Methods in Security Engineering, pages 11-23, 2003.
-
(2003)
Proceedings of ACM Workshop on Formal Methods in Security Engineering
, pp. 11-23
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
10
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. Van Oorschot, and M. J. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
13
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J. C. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. Journal of Computer Security, 11(4):677-721, 2004.
-
(2004)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.C.2
Pavlovic, D.3
-
14
-
-
0000218554
-
The undecidability of the second-order unification problem
-
W. D. Goldfarb. The undecidability of the second-order unification problem. Theoretical Computer Science, 13:225-230, 1981.
-
(1981)
Theoretical Computer Science
, vol.13
, pp. 225-230
-
-
Goldfarb, W.D.1
-
17
-
-
4944267395
-
Internet Key Exchange (IKEv2) Protocol
-
C. Kaufman. Internet Key Exchange (IKEv2) Protocol, 2004. Internet Draft.
-
(2004)
Internet Draft
-
-
Kaufman, C.1
-
18
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. J. Cryptology, 7(2):79-130, 1994.
-
(1994)
J. Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
19
-
-
35248816546
-
Sigma: The sign-and-mac approach to authenticated diffie-hellman and its use in the IKE protocols
-
Springer-Verlag Heidelberg
-
H. Krawczyk. Sigma: The sign-and-mac approach to authenticated diffie-hellman and its use in the IKE protocols. In Advances in Cryptology - CRYPTO 2003, volume 2729, pages 400-425. Springer-Verlag Heidelberg, 2003.
-
(2003)
Advances in Cryptology - CRYPTO 2003
, vol.2729
, pp. 400-425
-
-
Krawczyk, H.1
-
20
-
-
0005243827
-
An efficient protocol for authenticated key agreement
-
COOR
-
L. Law, A. Menezes, M. Qu, J. Solinas, and S. Vanstone. An efficient protocol for authenticated key agreement. Technical Report 98-05, COOR, 1998.
-
(1998)
Technical Report
, vol.98
, Issue.5
-
-
Law, L.1
Menezes, A.2
Qu, M.3
Solinas, J.4
Vanstone, S.5
-
27
-
-
1442267753
-
A probabilistic polynomial-time calculus for the analysis of cryptographic protocols (preliminary report)
-
Stephen Brookes and Michael Mislove, editors, Electronic notes in Theoretical Computer Science
-
J. C. Mitchell, A. Ramanathan, A. Scedrov, and V. Teague. A probabilistic polynomial-time calculus for the analysis of cryptographic protocols (preliminary report). In Stephen Brookes and Michael Mislove, editors, 17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, May, 2001, volume 45. Electronic notes in Theoretical Computer Science, 2001.
-
(2001)
17th Annual Conference on the Mathematical Foundations of Programming Semantics, Arhus, Denmark, May, 2001
, vol.45
-
-
Mitchell, J.C.1
Ramanathan, A.2
Scedrov, A.3
Teague, V.4
-
29
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
32
-
-
84944075155
-
Guarded transitions in evolving specifications
-
H. Kirchner and C. Ringeissen, editors, Springer Verlag
-
D. Pavlovic and D. R. Smith. Guarded transitions in evolving specifications. In H. Kirchner and C. Ringeissen, editors, Proceedings of AMAST 2002, volume 2422 of LNCS, pages 411-425. Springer Verlag, 2002.
-
(2002)
Proceedings of AMAST 2002, Volume 2422 of LNCS
, vol.2422
, pp. 411-425
-
-
Pavlovic, D.1
Smith, D.R.2
-
33
-
-
0034823388
-
A model for asynchronous reactive systems and its application to secure message transmission
-
Washington
-
B. Pfitzmann and M. Waidner. A model for asynchronous reactive systems and its application to secure message transmission. In IEEE Symposium on Security and Privacy, pages 184-200, Washington, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 184-200
-
-
Pfitzmann, B.1
Waidner, M.2
|