-
1
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ABADI, M. AND FOURNET, C. 2001, Mobile values, new names, and secure communication. In Proceedings of the 28th ACM Symposium on Principles of Programming Languages (POPL'01). 104-115.
-
(2001)
Proceedings of the 28th ACM Symposium on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
ABADI, M.1
AND FOURNET, C.2
-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
ABADI, M. AND GORDON, A. D. 1999. A calculus for cryptographic protocols: The spi calculus. Inform. Comput. 148, 1-70.
-
(1999)
Inform. Comput
, vol.148
, pp. 1-70
-
-
ABADI, M.1
AND GORDON, A.D.2
-
3
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
ABADI, M. AND ROGAWAY, P. 2002. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptol. 15, 2, 103-127.
-
(2002)
J. Cryptol
, vol.15
, Issue.2
, pp. 103-127
-
-
ABADI, M.1
AND ROGAWAY, P.2
-
5
-
-
33845204881
-
-
Apache Software Foundation
-
Apache Software Foundation 2006. Apache WSS4J. Apache Software Foundation. http://ws.apache.org/ws s4j/.
-
(2006)
Apache WSS4J
-
-
-
6
-
-
33646080360
-
Security-typed languages for implementation of cryptographic protocols: A case study
-
Proceedings of the 10th European Symposium on Research in Computer Security ESORICS'05, Springer
-
ASKAROV, A. AND SABELFELD, A. 2005. Security-typed languages for implementation of cryptographic protocols: A case study. In Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS'05). Lecture Notes in Computer Science, vol. 3679. Springer, 197-221.
-
(2005)
Lecture Notes in Computer Science
, vol.3679
, pp. 197-221
-
-
ASKAROV, A.1
AND SABELFELD, A.2
-
7
-
-
1442292329
-
A composable cryptographic library with nested operations
-
ACM Press
-
BACKES, M., PFITZMANN, B., AND WAIDNER, M. 2003. A composable cryptographic library with nested operations. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). ACM Press, 220-230.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 220-230
-
-
BACKES, M.1
PFITZMANN, B.2
AND WAIDNER, M.3
-
9
-
-
34249658491
-
ACM Trans. Inform. Syst. Secur. 10
-
2, Article 8
-
BHARGAVAN, K., CORIN, R., FOURNET, C., AND GORDON, A. D. 2007c. Secure sessions for Web services. ACM Trans. Inform. Syst. Secur. 10, 2, Article 8.
-
(2007)
-
-
BHARGAVAN, K.1
CORIN, R.2
FOURNET, C.3
AND GORDON, A.D.4
-
10
-
-
57849106656
-
Cryptographically verified implementations for TLS
-
BHARGAVAN, K., FOURNET, C., CORIN, R., AND ZǍLINESCU, E. 2008b. Cryptographically verified implementations for TLS. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08). 459-468.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08)
, pp. 459-468
-
-
BHARGAVAN, K.1
FOURNET, C.2
CORIN, R.3
AND ZǍLINESCU, E.4
-
11
-
-
14844303360
-
Verifying policy-based security for Web services
-
BHARGAVAN, K., FOURNET, C., AND GORDON, A. D., 2004b. Verifying policy-based security for Web services. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04). 268-277.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 268-277
-
-
BHARGAVAN, K.1
FOURNET, C.2
AND GORDON, A.D.3
-
12
-
-
18544363572
-
A semantics for Web services authentication
-
BHARGAVAN, K., FOURNET, C., AND GORDON, A. D. 2005. A semantics for Web services authentication. Theor. Comput. Sci. 340, 1, 102-153.
-
(2005)
Theor. Comput. Sci
, vol.340
, Issue.1
, pp. 102-153
-
-
BHARGAVAN, K.1
FOURNET, C.2
AND GORDON, A.D.3
-
13
-
-
33845212195
-
Verified reference implementations of WS-Security protocols
-
Proceedings of the 3rd International Workshop on Web Services and Formal Methods WS-FM 2006, Springer
-
BHARGAVAN, K., FOURNET, C., AND GORDON, A. D. 2006b. Verified reference implementations of WS-Security protocols. In Proceedings of the 3rd International Workshop on Web Services and Formal Methods (WS-FM 2006). Lecture Notes in Computer Science, vol. 4184. Springer, 88-106.
-
(2006)
Lecture Notes in Computer Science
, vol.4184
, pp. 88-106
-
-
BHARGAVAN, K.1
FOURNET, C.2
AND GORDON, A.D.3
-
14
-
-
35048821943
-
TulaFale: A security tool for Web services
-
Proceedings of the International Symposium on Formal Methods for Components and. Objects FMCO'03, Springer
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND PUCELLA, R. 2004a. TulaFale: A security tool for Web services. In Proceedings of the International Symposium on Formal Methods for Components and. Objects (FMCO'03). Lecture Notes in Computer Science, vol. 3188. Springer, 197-222.
-
(2004)
Lecture Notes in Computer Science
, vol.3188
, pp. 197-222
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
AND PUCELLA, R.4
-
15
-
-
67649884132
-
Verified implementations of the Information Card federated identity-management protocol
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND SWAMY, N. 2008a. Verified implementations of the Information Card federated identity-management protocol. In Proceedings of the ACM Symposium on Information, Computer and. Communications Security (ASIACCS'08). 123-135.
-
(2008)
Proceedings of the ACM Symposium on Information, Computer and. Communications Security (ASIACCS'08)
, pp. 123-135
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
AND SWAMY, N.4
-
16
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND TSE, S. 2006a. Verified interoperable implementations of security protocols. In Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06). 139-152.
-
(2006)
Proceedings of the 19th IEEE Computer Security Foundations Workshop (CSFW'06)
, pp. 139-152
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
AND TSE, S.4
-
17
-
-
57849100420
-
Verified interoperable implementations of security protocols
-
IOS Press
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND TSE, S. 2007a. Verified interoperable implementations of security protocols. In Software System Reliability and Security. IOS Press, 87-115.
-
(2007)
Software System Reliability and Security
, pp. 87-115
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
AND TSE, S.4
-
18
-
-
33947663592
-
Verified interoperable implementations of security protocols
-
Tech. rep. MSR-TR-2006-46, Microsoft Research
-
BHARGAVAN, K., FOURNET, C., GORDON, A. D., AND TSE, S. 2007b. Verified interoperable implementations of security protocols. Tech. rep. MSR-TR-2006-46, Microsoft Research.
-
(2007)
-
-
BHARGAVAN, K.1
FOURNET, C.2
GORDON, A.D.3
AND TSE, S.4
-
22
-
-
13644264990
-
Verification of cryptographic protocols: Tagging enforces termination
-
BLANCHET, B. AND PODELSKI, A. 2005. Verification of cryptographic protocols: Tagging enforces termination. Theor. Comput. Sci. 333, 1-2, 67-90.
-
(2005)
Theor. Comput. Sci
, vol.333
, Issue.1-2
, pp. 67-90
-
-
BLANCHET, B.1
AND PODELSKI, A.2
-
23
-
-
84942246406
-
Automatic validation of protocol narration
-
BODEI, C., BUCHHOLTZ, M., DEGANO, P., AND NIELSON, F. 2003. Automatic validation of protocol narration. In Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03) 126-140.
-
(2003)
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW'03)
, pp. 126-140
-
-
BODEI, C.1
BUCHHOLTZ, M.2
DEGANO, P.3
AND NIELSON, F.4
-
24
-
-
0020720357
-
On the security of public key protocols
-
DOLEV, D. AND YAO, A. 1983. On the security of public key protocols. IEEE Trans. Inform. Theor. IT-29, 2, 198-208.
-
(1983)
IEEE Trans. Inform. Theor
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
DOLEV, D.1
AND YAO, A.2
-
25
-
-
34548102586
-
XML Encryption Syntax and Processing
-
EASTLAKE, D., REAGLE, J., IMAMURA, T., DILLAWAY, B., AND SIMON, E. 2002. XML Encryption Syntax and Processing. W3C. W3C Recommendation.
-
(2002)
Recommendation
, vol.W3C
-
-
EASTLAKE, D.1
REAGLE, J.2
IMAMURA, T.3
DILLAWAY, B.4
AND SIMON, E.5
-
26
-
-
34548102586
-
XML-Signature Syntax and Processing
-
EASTLAKE, D., REAGLE, J., SOLO, D., BARTEL, M., BOYER, J., FOX, B., LAMACCHIA, B., AND SIMON, E. 2002. XML-Signature Syntax and Processing. W3C. W3C Recommendation.
-
(2002)
Recommendation
, vol.W3C
-
-
EASTLAKE, D.1
REAGLE, J.2
SOLO, D.3
BARTEL, M.4
BOYER, J.5
FOX, B.6
LAMACCHIA, B.7
AND SIMON, E.8
-
27
-
-
14644429758
-
A hierarchy of equivalences for asynchronous calculi
-
FOURNET, C. AND GONTHIER, G. 2005. A hierarchy of equivalences for asynchronous calculi. J. Logic Algeb. Program. 63, 131-173.
-
(2005)
J. Logic Algeb. Program
, vol.63
, pp. 131-173
-
-
FOURNET, C.1
AND GONTHIER, G.2
-
29
-
-
1442286773
-
On the secure implementation of security protocols
-
GIAMBIAGI, P. AND DAM, M. 2004. On the secure implementation of security protocols. Sci. Comput. Program. 50, 73-99.
-
(2004)
Sci. Comput. Program
, vol.50
, pp. 73-99
-
-
GIAMBIAGI, P.1
AND DAM, M.2
-
31
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation VMCAI'05, Springer
-
GOUBAULT-LARRECQ, J. AND PARRENNES, F. 2005. Cryptographic protocol analysis on real C code. In Proceedings of the 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05). Lecture Notes in Computer Science, vol. 3385. Springer, 363-379.
-
(2005)
Lecture Notes in Computer Science
, vol.3385
, pp. 363-379
-
-
GOUBAULT-LARRECQ, J.1
AND PARRENNES, F.2
-
32
-
-
33646176467
-
Programming cryptographic protocols
-
Proceedings of the Conference Trusted. Global Computing TGC'05, Springer
-
GUTTMAN, J. D., HERZOG, J. C, RAMSDELL, J. D., AND SNIFFEN, B. T. 2005. Programming cryptographic protocols. In Proceedings of the Conference Trusted. Global Computing (TGC'05). Lecture Notes in Computer Science, vol. 3705. Springer, 116-145.
-
(2005)
Lecture Notes in Computer Science
, vol.3705
, pp. 116-145
-
-
GUTTMAN, J.D.1
HERZOG, J.C.2
RAMSDELL, J.D.3
AND SNIFFEN, B.T.4
-
33
-
-
33845196010
-
-
IBM CORPORATION
-
IBM CORPORATION. 2006. IBM WebSphere Application Server. IBM Corporation. http://www.ibm.com/software/websphere/.
-
(2006)
IBM WebSphere Application Server
-
-
-
37
-
-
85026563474
-
On asynchrony in name-passing calculi
-
Proceedings of the Conference Automata, Languages and Programming ICALP'98, Springer
-
MERRO, M. AND SANGIORGI, D. 1998. On asynchrony in name-passing calculi. In Proceedings of the Conference Automata, Languages and Programming (ICALP'98). Lecture Notes in Computer Science, vol. 1443. Springer, 856-867.
-
(1998)
Lecture Notes in Computer Science
, vol.1443
, pp. 856-867
-
-
MERRO, M.1
AND SANGIORGI, D.2
-
38
-
-
14844329713
-
-
MICROSOFT CORPORATION
-
MICROSOFT CORPORATION. 2004. Web Services Enhancements (WSE) 2.0. Microsoft Corporation. http://msdn.microsoft.com/ webservices/building/wse/default.aspx.
-
(2004)
Web Services Enhancements (WSE) 2.0
-
-
-
39
-
-
57849131522
-
-
MICROSOFT CORPORATION. 2005. F#. Microsoft Corporation. http://research.microsoft.com/fsharp/.
-
MICROSOFT CORPORATION. 2005. F#. Microsoft Corporation. http://research.microsoft.com/fsharp/.
-
-
-
-
40
-
-
77749259716
-
-
MICROSOFT CORPORATION
-
MICROSOFT CORPORATION. 2006. Windows Communication Foundation (WCF). Microsoft Corporation. http://wcf.netfx3.com/.
-
(2006)
Windows Communication Foundation (WCF)
-
-
-
41
-
-
57849093413
-
-
MICROSOFT CORPORATION
-
MICROSOFT CORPORATION. 2007. FS2PV: A Cryptographic-Protocol Verifier for F#. Microsoft Corporation. http://research.microsoft.com/projects/samoa/.
-
(2007)
FS2PV: A Cryptographic-Protocol Verifier for F
-
-
-
42
-
-
84976193394
-
Functions as processes
-
MILNER, R. 1992. Functions as processes. Math. Struct. Comput. Sci. 2, 2, 119-141.
-
(1992)
Math. Struct. Comput. Sci
, vol.2
, Issue.2
, pp. 119-141
-
-
MILNER, R.1
-
44
-
-
3042673595
-
Cryptographic protocol generation from CAPSL
-
Tech. rep. SRI-CSL-01-07, SRI
-
MULLER, F. AND MILLEN, J. 2001. Cryptographic protocol generation from CAPSL. Tech. rep. SRI-CSL-01-07, SRI.
-
(2001)
-
-
MULLER, F.1
AND MILLEN, J.2
-
45
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
NEEDHAM, R. AND SCHROEDER, M. 1978. Using encryption for authentication in large networks of computers. Comm. ACM 21, 12, 993-999.
-
(1978)
Comm. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
NEEDHAM, R.1
AND SCHROEDER, M.2
-
47
-
-
57849162675
-
Elyjah: A security analyzer for Java implementations of communications protocols
-
project report, Computer Science, Division of Informatics, University of Edinburgh
-
O'SHEA, N. 2006. Elyjah: A security analyzer for Java implementations of communications protocols. Fourth year project report, Computer Science, Division of Informatics, University of Edinburgh.
-
(2006)
Fourth year
-
-
O'SHEA, N.1
-
48
-
-
0023247970
-
Efficient and timely mutual authentication
-
OTWAY, D. AND REES, O. 1987. Efficient and timely mutual authentication. Oper. Syst. Rev. 21, 1, 8-10.
-
(1987)
Oper. Syst. Rev
, vol.21
, Issue.1
, pp. 8-10
-
-
OTWAY, D.1
AND REES, O.2
-
49
-
-
84958777572
-
AGVI - automatic generation, verification, and implementation of security protocols
-
Proceedings of the 13th Conference on Computer Aided Verification CAV
-
PERRIG, A., SONG, D., AND PHAN, D. 2001. AGVI - automatic generation, verification, and implementation of security protocols. In Proceedings of the 13th Conference on Computer Aided Verification (CAV). Lecture Notes in Computer Science. Springer, 241-245.
-
(2001)
Lecture Notes in Computer Science. Springer
, vol.241-245
-
-
PERRIG, A.1
SONG, D.2
AND PHAN, D.3
-
50
-
-
3042621964
-
Spi2Java: Automatic cryptographic protocol Java code generation from spi calculus
-
POZZA, D., SISTO, R., AND DURANTE, L. 2004. Spi2Java: automatic cryptographic protocol Java code generation from spi calculus. In Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004). Vol. 1. 400-405.
-
(2004)
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004)
, vol.1
, pp. 400-405
-
-
POZZA, D.1
SISTO, R.2
AND DURANTE, L.3
-
53
-
-
57849134055
-
-
W3C 2003. SOAP Version 1.2. W3C. W3C Recommendation
-
W3C 2003. SOAP Version 1.2. W3C. W3C Recommendation.
-
-
-
-
54
-
-
57849169264
-
-
W3C 2004. Web Services Addressing (WS-Addressing). W3C. W3C Member Submission.
-
W3C 2004. Web Services Addressing (WS-Addressing). W3C. W3C Member Submission.
-
-
-
|