-
3
-
-
0032671775
-
A meta-notation for protocol analysis
-
R. Gorrieri, editor, Mordano, Italy, 28-30 June IEEE Computer Society Press
-
I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, and A. Scedrov. A meta-notation for protocol analysis. In R. Gorrieri, editor, Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99, pages 55-69, Mordano, Italy, 28-30 June 1999. IEEE Computer Society Press.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop - CSFW'99
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
4
-
-
0033698744
-
Relating strands and multiset rewriting for security protocol analysis
-
P. Syverson, editor, Cambridge, UK, 3-5 July IEEE Computer Society Press
-
I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, and A. Scedrov. Relating strands and multiset rewriting for security protocol analysis. In P. Syverson, editor, 13th IEEE Computer Security Foundations Workshop - CSFW'00, Cambridge, UK, 3-5 July 2000. IEEE Computer Society Press.
-
(2000)
13th IEEE Computer Security Foundations Workshop - CSFW'00
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
7
-
-
33646165007
-
Automated security analysis of cryptographic protocols using coloured Petri net specifications
-
E. Doyle, S. E. Tavares, and H. Meijer. Automated security analysis of cryptographic protocols using coloured Petri net specifications. In SAC'95, 1995.
-
(1995)
SAC'95
-
-
Doyle, E.1
Tavares, S.E.2
Meijer, H.3
-
10
-
-
48249136282
-
Modelling and analyzing cryptographic protocols using Petri nets
-
Advances in Cryptology-AUSCRYPT '92, Springer- Verlag
-
B. B. Nieh and S. E. Tavares. Modelling and analyzing cryptographic protocols using Petri nets. In Advances in Cryptology-AUSCRYPT '92, volume 718 of LNCS, pages 275-295. Springer-Verlag, 1992.
-
(1992)
LNCS
, vol.718
, pp. 275-295
-
-
Nieh, B.B.1
Tavares, S.E.2
-
11
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
13
-
-
85029606643
-
Observable properties of higher order functions that dynamically create local names, or: What's new?
-
Mathematical Foundations of Computer Science, Proc. 18th Int. Symp., Gdañsk, 1993, Springer- Verlag, Berlin
-
A. M. Pitts and I. Stark. Observable properties of higher order functions that dynamically create local names, or: What's new? In Mathematical Foundations of Computer Science, Proc. 18th Int. Symp., Gdañsk, 1993, volume 711 of Lecture Notes in Computer Science, pages 122-141. Springer-Verlag, Berlin, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.711
, pp. 122-141
-
-
Pitts, A.M.1
Stark, I.2
-
14
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
17
-
-
85022794780
-
Event Structures
-
Springer- Verlag
-
G. Winskel. Event Structures, volume 255 of LNCS, pages 325-392. Springer-Verlag, 1986.
-
(1986)
LNCS
, vol.255
, pp. 325-392
-
-
Winskel, G.1
-
18
-
-
45949126084
-
Petri nets, algebras, morphisms, and compositionality
-
G. Winskel. Petri nets, algebras, morphisms, and compositionality. Information and Computation, 72:197-238, 1987.
-
(1987)
Information and Computation
, vol.72
, pp. 197-238
-
-
Winskel, G.1
|