-
1
-
-
58049097680
-
From one session to many: Dynamic tags for security protocols
-
LSV-08-20, ENS Cachan, France, 30 pages June
-
Arapinis, M., Delaune, S., Kremer, S.: From one session to many: Dynamic tags for security protocols. Research Report LSV-08-20, ENS Cachan, France, 30 pages (June 2008)
-
(2008)
Research Report
-
-
Arapinis, M.1
Delaune, S.2
Kremer, S.3
-
2
-
-
38349010575
-
Bounding messages for free in security protocols
-
Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer, Heidelberg
-
Arapinis, M., Duflot, M.: Bounding messages for free in security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 376-387. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4855
, pp. 376-387
-
-
Arapinis, M.1
Duflot, M.2
-
3
-
-
26444497860
-
-
Armando, A., et al.: The Avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
-
Armando, A., et al.: The Avispa tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
58049089829
-
How to guarantee secrecy for cryptographic protocols
-
Beauquier, D., Gauche, F.: How to guarantee secrecy for cryptographic protocols. CoRR, abs/cs/0703140 (2007)
-
(2007)
CoRR, abs/cs/0703140
-
-
Beauquier, D.1
Gauche, F.2
-
5
-
-
0031642585
-
A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract)
-
ACM Press, New York
-
Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract). In: Proc. 30th Annual ACM Symposium on the Theory of Computing (STOC 1998), pp. 419-428. ACM Press, New York (1998)
-
(1998)
Proc. 30th Annual ACM Symposium on the Theory of Computing (STOC
, pp. 419-428
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
6
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Gordon, A.D, ed, FOSSACS 2003, Springer, Heidelberg
-
Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) FOSSACS 2003. LNCS, vol. 2620, pp. 136-152. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2620
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
10
-
-
38349000750
-
Safely composing security protocols
-
Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer, Heidelberg
-
Cortier, V., Delaitre, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, pp. 352-363. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4855
, pp. 352-363
-
-
Cortier, V.1
Delaitre, J.2
Delaune, S.3
-
11
-
-
58049097565
-
Safely composing security protocols
-
LSV-08-06, ENS Cachan, France, 39 pages March
-
Cortier, V., Delaune, S.: Safely composing security protocols. Research Report LSV-08-06, ENS Cachan, France, 39 pages (March 2008)
-
(2008)
Research Report
-
-
Cortier, V.1
Delaune, S.2
-
12
-
-
38048999097
-
Synthesizing secure protocols
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Cortier, V., Warinschi, B., Zǎlinescu, E.: Synthesizing secure protocols. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 406-421. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 406-421
-
-
Cortier, V.1
Warinschi, B.2
Zǎlinescu, E.3
-
13
-
-
33845189681
-
-
Cortier, V., Zǎlinescu, E.: Deciding key cycles for security protocols. In: Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS, 4246, pp. 317-331. Springer, Heidelberg (2006)
-
Cortier, V., Zǎlinescu, E.: Deciding key cycles for security protocols. In: Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS, vol. 4246, pp. 317-331. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
0020927643
-
On the security of ping-pong protocols
-
Dolev, D., Even, S., Karp, R.M.: On the security of ping-pong protocols. In: Proc. Advances in Cryptology (CRYPTO 1982), pp. 177-186 (1982)
-
(1982)
Proc. Advances in Cryptology (CRYPTO
, pp. 177-186
-
-
Dolev, D.1
Even, S.2
Karp, R.M.3
-
17
-
-
0042500424
-
Undecidability of bounded security protocols
-
Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Undecidability of bounded security protocols. In: Proc. Workshop on Formal Methods and Security Protocols (1999)
-
(1999)
Proc. Workshop on Formal Methods and Security Protocols
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
18
-
-
0033683193
-
How to prevent type flaw attacks on security protocols
-
IEEE Comp. Soc. Press, Los Alamitos
-
Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. In: Proc. 13th Computer Security Foundations Workshop (CSFW 2001), pp. 255-268. IEEE Comp. Soc. Press, Los Alamitos (2000)
-
(2000)
Proc. 13th Computer Security Foundations Workshop (CSFW
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
19
-
-
35248878854
-
Scalable protocols for authenticated group key exchange
-
Boneh, D, ed, CRYPTO 2003, Springer, Heidelberg
-
Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110-125. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2729
, pp. 110-125
-
-
Katz, J.1
Yung, M.2
-
20
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
21
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of Computer Security 7(1) (1999)
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Lowe, G.1
-
23
-
-
35248886574
-
Tagging makes secrecy decidable for unbounded nonces as well
-
Pandya, P.K, Radhakrishnan, J, eds, FSTTCS 2003, Springer, Heidelberg
-
Ramanujam, R., Suresh, S.P.: Tagging makes secrecy decidable for unbounded nonces as well. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol. 2914, pp. 363-374. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2914
, pp. 363-374
-
-
Ramanujam, R.1
Suresh, S.P.2
-
24
-
-
11944251803
-
Decidability of context-explicit security protocols
-
Ramanujam, R., Suresh, S.P.: Decidability of context-explicit security protocols. Journal of Computer Security 13(1), 135-165 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 135-165
-
-
Ramanujam, R.1
Suresh, S.P.2
-
25
-
-
0037453396
-
Protocol insecurity with finite number of sessions and composed keys is NP-complete
-
Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions and composed keys is NP-complete. Theoretical Computer Science 299(1-3), 451-475 (2003)
-
(2003)
Theoretical Computer Science
, vol.299
, Issue.1-3
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
|