-
1
-
-
24344493908
-
Computer-Assisted Verification of a Protocol for Certified Email
-
58(l-2):3-27
-
M. Abadi and B. Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. Science of Computer Programming, 58(l-2):3-27, 2005.
-
(2005)
Science of Computer Programming
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
34547517142
-
Just fast keying in the pi calculus
-
M. Abadi, B. Blanchet, and C. Fournet. Just fast keying in the pi calculus. ACM Transactions on Information and System Security, 10(3): 1-59, 2007.
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.3
, pp. 1-59
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
3
-
-
0003761061
-
A calculus for cryptographic protocols the spi calculus
-
149, 1998
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols the spi calculus. Research Report 149, 1998.
-
Research Report
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84855729971
-
Web services policy 1.2 - attachment (WS- policyattachment)
-
S. Bajaj et al. Web services policy 1.2 - attachment (WS- policyattachment). W3C Recommendation, 2006.
-
(2006)
Recommendation
, vol.W3C
-
-
Bajaj, S.1
-
6
-
-
84855729971
-
Web services policy 1.2 - framework (WS- policy)
-
S. Bajaj et al. Web services policy 1.2 - framework (WS- policy). W3C Recommendation, 2006.
-
(2006)
Recommendation
, vol.W3C
-
-
Bajaj, S.1
-
8
-
-
77954342153
-
An advisor for web services security policies
-
K. Bhargavan, C. Fournet, A. D. Gordon, and G. O'Shea. An advisor for web services security policies. In Workshop on Secure web services, pages 1-9, 2005.
-
(2005)
Workshop on Secure web services
, pp. 1-9
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
O'Shea, G.4
-
9
-
-
58449124921
-
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In
-
-
-
-
11
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In IEEE Computer Security Foundations Workshop, pages 82-96, 2001.
-
(2001)
IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
13
-
-
3042538976
-
Automatic testing equivalence verification of spi calculus specifications
-
L. Durante, R. Sisto, and A. Valenzano. Automatic testing equivalence verification of spi calculus specifications. ACM Transactions on Software Engineering and Methodology, 12(2):222-284, 2003.
-
(2003)
ACM Transactions on Software Engineering and Methodology
, vol.12
, Issue.2
, pp. 222-284
-
-
Durante, L.1
Sisto, R.2
Valenzano, A.3
-
15
-
-
24144433896
-
Implementing a formally verifiable security protocol in Java card
-
E. Hubbers, M. Oostdijk, and E. Poll. Implementing a formally verifiable security protocol in Java card. In Security in Pervasive Computing, pages 213-226, 2003.
-
(2003)
Security in Pervasive Computing
, pp. 213-226
-
-
Hubbers, E.1
Oostdijk, M.2
Poll, E.3
-
18
-
-
33745178885
-
Verification of low-level crypto-protocol implementations using automated theorem proving
-
J. Jürjens. Verification of low-level crypto-protocol implementations using automated theorem proving. In Formal Methods and Models for Co-Design, pages 89-98, 2005.
-
(2005)
Formal Methods and Models for Co-Design
, pp. 89-98
-
-
Jürjens, J.1
-
20
-
-
58449117676
-
-
A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo. OASIS web services security: SOAP message security 1.1 (WS-security 2004), 2006.
-
A. Nadalin, C. Kaler, P. Hallam-Baker, and R. Monzillo. OASIS web services security: SOAP message security 1.1 (WS-security 2004), 2006.
-
-
-
-
22
-
-
48049092340
-
An experiment in interoperable cryptographic protocol implementation using automatic code generation
-
A. Pironti and R. Sisto. An experiment in interoperable cryptographic protocol implementation using automatic code generation. In IEEE Symposium on Computers and Communications, pages 839-844, 2007.
-
(2007)
IEEE Symposium on Computers and Communications
, pp. 839-844
-
-
Pironti, A.1
Sisto, R.2
-
23
-
-
58449132573
-
Correctness-preserving translation from Spi Calculus to Java
-
revision 2. Technical Report, Politecnico di Torino, Aug, Available at
-
A. Pironti and R. Sisto. Correctness-preserving translation from Spi Calculus to Java, revision 2. Technical Report, Politecnico di Torino, Aug. 2008. Available at: http://staff.polito.it/riccardo.sisto/reports/translation2. ps.
-
(2008)
-
-
Pironti, A.1
Sisto, R.2
-
26
-
-
18144362508
-
ASM refinement and generalizations of forward simulation in data refinement: A comparison
-
G. Schellhorn. ASM refinement and generalizations of forward simulation in data refinement: a comparison. Theoretical Computer Science, 336(2-3):403-435, 2005.
-
(2005)
Theoretical Computer Science
, vol.336
, Issue.2-3
, pp. 403-435
-
-
Schellhorn, G.1
|