-
2
-
-
84957872542
-
Reasoning about cryptographic protocols in the spi calculus
-
Berlin, Germany: Springer-Verlag
-
Abadi M., Gordon A.D. Reasoning about cryptographic protocols in the spi calculus. CONCUR'97: Concurrency Theory, volume 1243. 1997;59-73 Springer-Verlag, Berlin, Germany
-
(1997)
CONCUR'97: Concurrency Theory, Volume 1243
, pp. 59-73
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
0000298407
-
A bisimulation method for cryptographic protocols
-
Abadi M., Gordon A.D. A bisimulation method for cryptographic protocols. Nordic Journal of Computing. 5:(4):Winter 1998;267-303
-
(1998)
Nordic Journal of Computing
, vol.5
, Issue.4
, pp. 267-303
-
-
Abadi, M.1
Gordon, A.D.2
-
9
-
-
0003313017
-
Using non interference for the analysis of security protocols
-
H. Orman and C. Meadows, editors Rutgers University, September DIMACS Center
-
R. Focardi, A. Ghelli, and R. Gorrieri. Using non interference for the analysis of security protocols. In H. Orman and C. Meadows, editors, Proceeding of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997. DIMACS Center.
-
(1997)
Proceeding of the DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Focardi, R.1
Ghelli, A.2
Gorrieri, R.3
-
10
-
-
84974776068
-
A classification of security properties for process algebras
-
Focardi R., Gorrieri R. A classification of security properties for process algebras. J. of Computer Security. 3:(1):1994/1995;5-33
-
(1994)
J. of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
11
-
-
1442267745
-
Secrecy in security protocols as non interference
-
S. Schneider and P. Ryan, editors Elsevier ENTCS
-
R. Focardi, R. Gorrieri, and F. Martinelli. Secrecy in security protocols as non interference. In S. Schneider and P. Ryan, editors, Proceedings of DERA/RHUL Workshop on Secure Architectures and Information Flow, volume 32. Elsevier ENTCS, 2000.
-
(2000)
Proceedings of DERA/RHUL Workshop on Secure Architectures and Information Flow
, vol.32
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
12
-
-
84958046259
-
A uniform approach for the definition of security properties
-
Proc. of World Congress on Formal Methods (FM'99), Springer
-
R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proc. of World Congress on Formal Methods (FM'99), Springer, LNCS 1708, pages 794-813, 1999.
-
(1999)
LNCS
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, F.2
-
14
-
-
0003733777
-
Decidability results in automata and process theory
-
F. Moller and G. Birthwistle, editors, Logic for Concurrency: Structure versus Automata Springer
-
Y. Hirshfeld and F. Moller. Decidability results in automata and process theory. In F. Moller and G. Birthwistle, editors, Logic for Concurrency: Structure versus Automata, volume 1043 of LNCS, pages 102-148. Springer, 1996.
-
(1996)
LNCS
, vol.1043
, pp. 102-148
-
-
Hirshfeld, Y.1
Moller, F.2
-
15
-
-
0025432462
-
Ccs expressions, finite state processes and three problems of equivalence
-
Kannellakis P., Smolka S. Ccs expressions, finite state processes and three problems of equivalence. Information and Computation. 86:1990;333-354
-
(1990)
Information and Computation
, vol.86
, pp. 333-354
-
-
Kannellakis, P.1
Smolka, S.2
-
16
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proc. of TACAS'96 Springer-Verlag
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. of TACAS'96, volume 1055 of LNCS, pages 147-166. Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
17
-
-
0003307796
-
Security models
-
J. Marciniak. John Wyley & Sons
-
McLean J. Security models. Marciniak J. Encyclopedia of Software Engineering. 1994;1136-1145 John Wyley & Sons
-
(1994)
Encyclopedia of Software Engineering
, pp. 1136-1145
-
-
McLean, J.1
-
19
-
-
0042361083
-
Nondeterministic admissible interference
-
Mullins J. Nondeterministic admissible interference. Journal of Universal Computer Science. 6:(11):2000;1054-1070
-
(2000)
Journal of Universal Computer Science
, vol.6
, Issue.11
, pp. 1054-1070
-
-
Mullins, J.1
-
20
-
-
0029228214
-
Absorbing covers and intransitive non-interference
-
Oakland, CA, May IEEE Computer Society
-
S. Pinsky. Absorbing covers and intransitive non-interference. In Proceedings of the IEEE Symp. on Research in Security and Privacy, pages 102-113, Oakland, CA, May 1995. IEEE Computer Society.
-
(1995)
Proceedings of the IEEE Symp. on Research in Security and Privacy
, pp. 102-113
-
-
Pinsky, S.1
-
21
-
-
0029484376
-
Modelling and verifying key-exchange using CSP and FDR
-
IEEE Computer Society Press
-
Roscoe A.W. Modelling and verifying key-exchange using CSP and FDR. 8th Computer Security Foundation Workshop. 1995;IEEE Computer Society Press
-
(1995)
8th Computer Security Foundation Workshop
-
-
Roscoe, A.W.1
-
24
-
-
19144362752
-
Decidability of DPDA equivalence
-
University of Edinburgh to appear in Theoretical Computer Science
-
C. Stirling. Decidability of DPDA equivalence. Technical Report LFCS99-411, University of Edinburgh, 2000. to appear in Theoretical Computer Science.
-
(2000)
Technical Report
, vol.LFCS99-411
-
-
Stirling, C.1
-
25
-
-
0026630927
-
Authentication for distributed systems
-
Woo T., Lam S. Authentication for distributed systems. IEEE Computer. 25:(1):January 1992;39-52
-
(1992)
IEEE Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.1
Lam, S.2
|