-
2
-
-
48949100658
-
-
M. Backes, S. Lorenz, M. Maffei, and K. Pecina. The CASPA tool: Causality-based abstraction for security protocol analysis. In A. Gupta and S. Malik, editors. CAV, 5123 of Lecture Notes in Computer Science, pages 419-422. Springer, 2008.
-
M. Backes, S. Lorenz, M. Maffei, and K. Pecina. The CASPA tool: Causality-based abstraction for security protocol analysis. In A. Gupta and S. Malik, editors. CAV, volume 5123 of Lecture Notes in Computer Science, pages 419-422. Springer, 2008.
-
-
-
-
4
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
D. Basin, S. Mödersheim, and L. Viganò. OFMC: A symbolic model checker for security protocols. International Journal of Information Security, 4(3):181-208, 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
5
-
-
70349268845
-
-
S. Berezin. Extensions to Athena: Constraint satisfiability problem and new pruning theorems based on type system extensions for messages. http://www. sergeyberezin.com/papers/athena-exteiisions.ps (unpublished manuscript), 2001.
-
S. Berezin. Extensions to Athena: Constraint satisfiability problem and new pruning theorems based on type system extensions for messages. http://www. sergeyberezin.com/papers/athena-exteiisions.ps (unpublished manuscript), 2001.
-
-
-
-
6
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
Cape Breton, June, IEEE Computer Society
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW), pages 82-96, Cape Breton, June 2001. IEEE Computer Society.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 82-96
-
-
Blanchet, B.1
-
7
-
-
24144452823
-
Static validation of security protocols
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. Nielson. Static validation of security protocols. Journal of Computer Security, 13(3):347-390, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.5
-
10
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R, Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(l):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.L
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
11
-
-
84958742278
-
An improved constraint-based system for the verification of security protocols
-
Proc. 9th International Static Analysis Symposium SAS, of, Spain, Sep, Springer
-
R. Corin and S. Etalle. An improved constraint-based system for the verification of security protocols. In Proc. 9th International Static Analysis Symposium (SAS), volume 2477 of Lecture Notes in Computer Science, pages 326-341, Spain, Sep 2002. Springer.
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 326-341
-
-
Corin, R.1
Etalle, S.2
-
12
-
-
33750936222
-
Feasibility of multi-protocol attacks
-
Vienna, Austria, April, IEEE Computer Society
-
C. Cremers. Feasibility of multi-protocol attacks. In Proc. of The First International Conference on Availability, Reliability and Security (ARES), pages 287-294, Vienna, Austria, April 2006, IEEE Computer Society.
-
(2006)
Proc. of The First International Conference on Availability, Reliability and Security (ARES)
, pp. 287-294
-
-
Cremers, C.1
-
13
-
-
48949088211
-
The Scyther Tool: Verification, falsification, and analysis of security protocols
-
Springer
-
C. Cremers. The Scyther Tool: Verification, falsification, and analysis of security protocols. In Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc, volume 5123/2008 of Lecture- Notes in Computer Science, pages 414-418. Springer, 2008.
-
(2008)
Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc, volume 5123/2008 of Lecture- Notes in Computer Science
, pp. 414-418
-
-
Cremers, C.1
-
15
-
-
24944514681
-
Operational semantics of security protocols
-
Scenarios: Models. Transformations and Tools, International Workshop, 2003, Revised Selected Papers, of, Springer
-
C. Cremers and S. Mauw. Operational semantics of security protocols. In Scenarios: Models. Transformations and Tools, International Workshop, 2003, Revised Selected Papers, volume 3466 of Lecture Notes in Computer Science. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3466
-
-
Cremers, C.1
Mauw, S.2
-
16
-
-
33847679489
-
-
S. Doghmi, J. D. Guttman, and F. Thayer. Skeletons, homomorphisms, and shapes: Characterizing protocol executions. In Proc. of the 23rd Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXIII), 173 of Electronic Notes in Theoretical Computer Science, pages 85-102. Elsevier ScienceDirect, April 2007.
-
S. Doghmi, J. D. Guttman, and F. Thayer. Skeletons, homomorphisms, and shapes: Characterizing protocol executions. In Proc. of the 23rd Conf. on the Mathematical Foundations of Programming Semantics (MFPS XXIII), volume 173 of Electronic Notes in Theoretical Computer Science, pages 85-102. Elsevier ScienceDirect, April 2007.
-
-
-
-
17
-
-
0020720357
-
On the security of public key protocols
-
Mar
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(12):198-208, Mar. 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
19
-
-
84855186480
-
Pattern-matching spi-calculus
-
C. Haack and A. Jeffrey. Pattern-matching spi-calculus. Inf. Cornput., 204(8):1195-1263, 2006.
-
(2006)
Inf. Cornput
, vol.204
, Issue.8
, pp. 1195-1263
-
-
Haack, C.1
Jeffrey, A.2
-
20
-
-
70349281193
-
-
F. O. P. IST-2001-39252. AVISPA: Automated validation of internet security protocols and applications, 2003.
-
F. O. P. IST-2001-39252. AVISPA: Automated validation of internet security protocols and applications, 2003.
-
-
-
-
21
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems TACAS, of, Springer
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. 2nd International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
22
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
IEEE Computer Society
-
G. Lowe. Casper: A compiler for the analysis of security protocols. In Proc. 10th IEEE Computer Security Foundations Workshop (CSFW), pages 18-30. IEEE Computer Society, 1997.
-
(1997)
Proc. 10th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 18-30
-
-
Lowe, G.1
-
23
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C.Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
24
-
-
70349288877
-
-
S. Meier. A formalization of an operational semantics of security protocols. Diploma thesis, ETH Zurich, August 2007. http: //people.inf.ethz.ch/ meiersi/fossp/index.html.
-
S. Meier. A formalization of an operational semantics of security protocols. Diploma thesis, ETH Zurich, August 2007. http: //people.inf.ethz.ch/ meiersi/fossp/index.html.
-
-
-
-
26
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.1
-
28
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
9(l/2):47-74
-
D. Song, S, Berezin, and A, Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(l/2):47-74, 2001.
-
(2001)
Journal of Computer Security
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
31
-
-
33749413267
-
The CL-Atse protocol analyser
-
Proc. RTA '06, of, Springer, Aug
-
M. Turuani. The CL-Atse protocol analyser. In Proc. RTA '06, volume 4098 of Lecture Notes in Computer Science, pages 227-286. Springer, Aug. 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4098
, pp. 227-286
-
-
Turuani, M.1
|