-
1
-
-
0001772130
-
Secret by typing in security protocols
-
M. Abadi, Secret by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
5
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory 44(5) (1998), 1897-1905.
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
6
-
-
0025386404
-
A logic for Authentication
-
M. Burrows, M. Abadi and R. Needham, A logic for Authentication, ACM Transactions on Computer Systems 8(1) (1990), 18-36.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
33745614656
-
Analyzing Security Protocols Using Association Rule Mining
-
Proceeding of Australian Conference on Artificial Intelligence 2005, Springer
-
Q.F. Chen and Y.Y.P. Chen, Analyzing Security Protocols Using Association Rule Mining. Proceeding of Australian Conference on Artificial Intelligence 2005, LNCS 3809, Springer, 2005, 245-253.
-
(2005)
LNCS
, vol.3809
, pp. 245-253
-
-
Chen, Q.F.1
Chen, Y.Y.P.2
-
9
-
-
33745670893
-
Detecting Collusion Attacks in Security Protocols
-
Proceeding of 8th Asia-Pacific Web Conference, Springer-Verlag
-
Q.F. Chen, Y.P.P. Chen, S.C. Zhang and C.Q. Zhang, Detecting Collusion Attacks in Security Protocols, Proceeding of 8th Asia-Pacific Web Conference, LNCS 3841, Springer-Verlag, 2006, 297-306.
-
(2006)
LNCS
, vol.3841
, pp. 297-306
-
-
Chen, Q.F.1
Chen, Y.P.P.2
Zhang, S.C.3
Zhang, C.Q.4
-
10
-
-
20344364418
-
A Logical Framework for Verifying Secure Transaction Protocols
-
ENDL
-
Q.F. Chen, C.Q. Zhang and S.C. Zhang, ENDL: A Logical Framework for Verifying Secure Transaction Protocols, Knowledge and Information Systems 7(1) (2006), 84-109.
-
(2006)
Knowledge and Information Systems
, vol.7
, Issue.1
, pp. 84-109
-
-
Chen, Q.F.1
Zhang, C.Q.2
Zhang, S.C.3
-
12
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. Han, P. Varshney, J. Katz and A. Khalili, A pairwise key predistribution scheme for wireless sensor networks, ACM Transactions on Information and System Security 8(2) (2005), 228-258.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
Katz, J.5
Khalili, A.6
-
14
-
-
0032623470
-
Security Protocols over open networks and distributed systems: Formal methods for their Analysis, Design, and Verification
-
S. Gritzalis, Security Protocols over open networks and distributed systems: Formal methods for their Analysis, Design, and Verification, Computer Communications 22(8) (1999), 695-707.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 695-707
-
-
Gritzalis, S.1
-
16
-
-
50249165700
-
-
http://b-course.cs.helsinki.fi/obc/.
-
-
-
-
17
-
-
50249116532
-
-
http://www.deakin.edu.au/̃qifengch/ksem/dependence.doc.
-
-
-
-
20
-
-
50249184382
-
-
J. Lin and A.O. Mendelzon, Knowledge base merging by majority, In Dynamic Worlds: From the Frame Problem to Knowledge Management, Kluwer, 1999.
-
J. Lin and A.O. Mendelzon, Knowledge base merging by majority, In Dynamic Worlds: From the Frame Problem to Knowledge Management, Kluwer, 1999.
-
-
-
-
21
-
-
0342658605
-
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), 1055, Springer, 1996, 147-166.
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), vol 1055, Springer, 1996, 147-166.
-
-
-
-
22
-
-
50249163554
-
Practical Asymmetric Fingerprinting with a TTP
-
A. Martínez-Ballesté, F. Sebé, J. Domingo-Ferrer and M. Soriano, Practical Asymmetric Fingerprinting with a TTP, Proceedings of the 14th International Workshop on Database and Expert Systems Applications, 2003, 352-357.
-
(2003)
Proceedings of the 14th International Workshop on Database and Expert Systems Applications
, pp. 352-357
-
-
Martínez-Ballesté, A.1
Sebé, F.2
Domingo-Ferrer, J.3
Soriano, M.4
-
23
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: Emerging issues and trends
-
C. Meadows, Formal methods for cryptographic protocol analysis: emerging issues and trends, IEEE Journal on Selected Areas in Communications 21(1) (2003), 44-54.
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 44-54
-
-
Meadows, C.1
-
26
-
-
50249186719
-
-
SET Secure Electronic Transaction Specification, Version 1.0, May 31
-
SET Secure Electronic Transaction Specification, Book 3: Formal Protocol Definition, Version 1.0, May 31, 1997.
-
(1997)
Book 3: Formal Protocol Definition
-
-
-
27
-
-
0042823817
-
Association Rule Mining: Models and Algorithms
-
Springer
-
C.Q. Zhang and S.C. Zhang,Association Rule Mining: Models and Algorithms, LNAI 2307, Springer, 2002.
-
(2002)
LNAI
, vol.2307
-
-
Zhang, C.Q.1
Zhang, S.C.2
|