-
1
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi and B. Blanchet, Analyzing security protocols with secrecy types and logic programs, Journal of the ACM 52(1) (2005), 102-146.
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
24344493908
-
-
M. Abadi and B. Blanchet, Computer-assisted verification of a protocol for certified email, Science of Computer Programming, Special issue SAS'03 58(1/2) (2005), 3-27.
-
M. Abadi and B. Blanchet, Computer-assisted verification of a protocol for certified email, Science of Computer Programming, Special issue SAS'03 58(1/2) (2005), 3-27.
-
-
-
-
3
-
-
34547517142
-
Just fast keying in the pi calculus
-
M. Abadi, B. Blanchet and C. Fournet, Just fast keying in the pi calculus, ACM Transactions on Information and System Security (TISSEC) 10(3) (2007), 1-59.
-
(2007)
ACM Transactions on Information and System Security (TISSEC)
, vol.10
, Issue.3
, pp. 1-59
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
4
-
-
17644411480
-
Mobile values, new names, and secure communication
-
ACM Press, London, UK
-
M. Abadi and C. Fournet, Mobile values, new names, and secure communication, in: 28th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01), ACM Press, London, UK, 2001, pp. 104-115.
-
(2001)
28th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
5
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Transactions on Software Engineering 22(1) (1996), 6-15.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
6
-
-
28144458017
-
Reconstruction of attacks against cryptographic protocols
-
France, June, IEEE
-
X. Allamigeon and B. Blanchet, Reconstruction of attacks against cryptographic protocols, in: 18th IEEE Computer Security Foundations Workshop (CSFW-18), Aix-en-Provence, France, June 2005, IEEE, 2005, pp. 140-154.
-
(2005)
in: 18th IEEE Computer Security Foundations Workshop (CSFW-18), Aix-en-Provence
, pp. 140-154
-
-
Allamigeon, X.1
Blanchet, B.2
-
7
-
-
84958762859
-
The game of the name in cryptographic tables
-
Advances in Computing Science, ASIAN'99, P.S. Thiagarajan and R. Yap, eds, Phuket, Thailand, December, Springer
-
R. Amadio and S. Prasad, The game of the name in cryptographic tables, in: Advances in Computing Science - ASIAN'99, P.S. Thiagarajan and R. Yap, eds, Phuket, Thailand, December 1999, Lecture Notes on Computer Science, Vol. 1742, Springer, 1999, pp. 15-27.
-
(1999)
Lecture Notes on Computer Science
, vol.1742
, pp. 15-27
-
-
Amadio, R.1
Prasad, S.2
-
8
-
-
19144369108
-
Programming Satan's computer
-
Computer Science Today: Recent Trends and Developments, J. van Leeuven, ed, Springer
-
R. Anderson and R. Needham, Programming Satan's computer, in: Computer Science Today: Recent Trends and Developments, J. van Leeuven, ed., Lecture Notes on Computer Science, Vol. 1000, Springer, 1995, pp. 426-440.
-
(1995)
Lecture Notes on Computer Science
, vol.1000
, pp. 426-440
-
-
Anderson, R.1
Needham, R.2
-
9
-
-
68249092518
-
-
L. Bachmair and H. Ganzinger, Resolution theorem proving, in: Handbook of Automated Reasoning, 1, Chapter 2, A. Robinson and A. Voronkov, eds, North-Holland, 2001, pp. 19-100.
-
L. Bachmair and H. Ganzinger, Resolution theorem proving, in: Handbook of Automated Reasoning, Vol. 1, Chapter 2, A. Robinson and A. Voronkov, eds, North-Holland, 2001, pp. 19-100.
-
-
-
-
10
-
-
35048817493
-
Causality-based abstraction of multiplicity in security protocols
-
Venice, Italy, July, IEEE
-
M. Backes, A. Cortesi and M. Maffei, Causality-based abstraction of multiplicity in security protocols, in: 20th IEEE Computer Security Foundations Symposium (CSF'07), Venice, Italy, July 2007, IEEE, 2007, pp. 355-369.
-
(2007)
20th IEEE Computer Security Foundations Symposium (CSF'07)
, pp. 355-369
-
-
Backes, M.1
Cortesi, A.2
Maffei, M.3
-
11
-
-
84945119254
-
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - CRYPTO 1993, Santa Barbara, CA, August 1993, D.R. Stinson, ed., Lecture Notes on Computer Science, 773, Springer, 1993, pp. 232-249.
-
M. Bellare and P. Rogaway, Entity authentication and key distribution, in: Advances in Cryptology - CRYPTO 1993, Santa Barbara, CA, August 1993, D.R. Stinson, ed., Lecture Notes on Computer Science, Vol. 773, Springer, 1993, pp. 232-249.
-
-
-
-
12
-
-
35048821943
-
-
K. Bhargavan, C. Fournet, A.D. Gordon and R. Pucella, TulaFale: A security tool for web services, in: Formal Methods for Components and Objects (FMCO 2003), Leiden, The Netherlands, November 2003, Lecture Notes on Computer Science, 3188, Springer, 2003, pp. 197-222. Paper and tool available at http://securing.ws/.
-
K. Bhargavan, C. Fournet, A.D. Gordon and R. Pucella, TulaFale: A security tool for web services, in: Formal Methods for Components and Objects (FMCO 2003), Leiden, The Netherlands, November 2003, Lecture Notes on Computer Science, Vol. 3188, Springer, 2003, pp. 197-222. Paper and tool available at http://securing.ws/.
-
-
-
-
13
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
NS, Canada, June, IEEE Computer Society
-
B. Blanchet, An efficient cryptographic protocol verifier based on Prolog rules, in: 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton, NS, Canada, June 2001, IEEE Computer Society, 2001, pp. 82-96.
-
(2001)
in: 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton
, pp. 82-96
-
-
Blanchet, B.1
-
14
-
-
84958749546
-
-
B. Blanchet, From secrecy to authenticity in security protocols, in: 9th International Static Analysis Symposium (SAS'02), Madrid, Spain, September 2002, M. Hermenegildo and G. Puebla, eds, Lecture Notes on Computer Science, 2477, Springer, 2002, pp. 342-359.
-
B. Blanchet, From secrecy to authenticity in security protocols, in: 9th International Static Analysis Symposium (SAS'02), Madrid, Spain, September 2002, M. Hermenegildo and G. Puebla, eds, Lecture Notes on Computer Science, Vol. 2477, Springer, 2002, pp. 342-359.
-
-
-
-
15
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
Oakland, CA, May
-
B. Blanchet, Automatic proof of strong secrecy for security protocols, in: IEEE Symposium on Security and Privacy, Oakland, CA, May 2004, pp. 86-100.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
Blanchet, B.1
-
16
-
-
33751055370
-
Automatic proof of strong secrecy for security protocols
-
Technical Report MPI-I-2004-NWG1-001, Max-Planck-Institut für Informatik, Saarbrücken, Germany, July
-
B. Blanchet, Automatic proof of strong secrecy for security protocols, Technical Report MPI-I-2004-NWG1-001, Max-Planck-Institut für Informatik, Saarbrücken, Germany, July 2004.
-
(2004)
-
-
Blanchet, B.1
-
17
-
-
22344454117
-
Security protocols: From linear to classical logic by abstract interpretation
-
B. Blanchet, Security protocols: From linear to classical logic by abstract interpretation, Information Processing Letters 95(5) (2005), 473-479.
-
(2005)
Information Processing Letters
, vol.95
, Issue.5
, pp. 473-479
-
-
Blanchet, B.1
-
18
-
-
50249174290
-
Automatic verification of correspondences for security protocols
-
0802.3444v1, 2008; available at
-
B. Blanchet, Automatic verification of correspondences for security protocols, Report arXiv:0802.3444v1, 2008; available at: http://arxiv.org/abs/ 0802.3444v1.
-
Report arXiv
-
-
Blanchet, B.1
-
19
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
B. Blanchet, M. Abadi and C. Fournet, Automated verification of selected equivalences for security protocols, Journal of Logic and Algebraic Programming 75(1) (2008), 3-51.
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
20
-
-
50249162614
-
Automated formal analysis of a protocol for secure file sharing on untrusted storage
-
Oakland, CA, May, IEEE
-
B. Blanchet and A. Chaudhuri, Automated formal analysis of a protocol for secure file sharing on untrusted storage, in: IEEE Symposium on Security and Privacy, Oakland, CA, May 2008, IEEE, 2008, pp. 417-431.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 417-431
-
-
Blanchet, B.1
Chaudhuri, A.2
-
21
-
-
13644264990
-
-
B. Blanchet and A. Podelski, Verification of cryptographic protocols: Tagging enforces termination, Theoretical Computer Science, Special issue FoSSaCS'03 333(1/2) (2005), 67-90.
-
B. Blanchet and A. Podelski, Verification of cryptographic protocols: Tagging enforces termination, Theoretical Computer Science, Special issue FoSSaCS'03 333(1/2) (2005), 67-90.
-
-
-
-
22
-
-
24144452823
-
Static validation of security protocols
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson and H.R. Nielson, Static validation of security protocols, Journal of Computer Security 13(3) (2005), 347-390.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.R.5
-
23
-
-
84944038631
-
Automating data independence
-
6th European Symposium on Research in Computer Security ESORICS 2000, Toulouse, France, October, Springer
-
P. Broadfoot, G. Lowe and B. Roscoe, Automating data independence, in: 6th European Symposium on Research in Computer Security (ESORICS 2000), Toulouse, France, October 2000, Lecture Notes on Computer Science, Vol. 1895, Springer, 2000, pp. 175-190.
-
(2000)
Lecture Notes on Computer Science
, vol.1895
, pp. 175-190
-
-
Broadfoot, P.1
Lowe, G.2
Roscoe, B.3
-
24
-
-
3042610243
-
Embedding agents within the intruder to detect parallel attacks
-
P.J. Broadfoot and A.W. Roscoe, Embedding agents within the intruder to detect parallel attacks, Journal of Computer Security 12(3/4) (2004), 379-408.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 379-408
-
-
Broadfoot, P.J.1
Roscoe, A.W.2
-
25
-
-
28144464907
-
-
M. Bugliesi, R. Focardi and M. Maffei, Analysis of typed analyses of authentication protocols, in: Proc. 18th IEEE Computer Security Foundations Workshop (CSFW'05), Aix-en-Provence, France, June 2005, IEEE Computer Society Press, 2005, pp. 112-125.
-
M. Bugliesi, R. Focardi and M. Maffei, Analysis of typed analyses of authentication protocols, in: Proc. 18th IEEE Computer Security Foundations Workshop (CSFW'05), Aix-en-Provence, France, June 2005, IEEE Computer Society Press, 2005, pp. 112-125.
-
-
-
-
26
-
-
34548820967
-
Dynamic types for authentication
-
M. Bugliesi, R. Focardi and M. Maffei, Dynamic types for authentication, Journal of Computer Security 15(6) (2007), 563-617.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.6
, pp. 563-617
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
27
-
-
0000523051
-
A logic of authentication
-
A preliminary version appeared as Digital Equipment Corporation Systems Research Center Report, February
-
M. Burrows, M. Abadi and R. Needham, A logic of authentication, Proceedings of the Royal Society of London A 426 (1989), 233-271. (A preliminary version appeared as Digital Equipment Corporation Systems Research Center Report No. 39, February 1989.)
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, Issue.39
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
28
-
-
35248865266
-
-
Y. Chevalier, R. Küsters, M. Rusinowitch and M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Mumbai, India, December 2003, P.K. Pandya and J. Radhakrishnan, eds, Lecture Notes on Computer Science, 2914, Springer, 2003, pp. 124-135.
-
Y. Chevalier, R. Küsters, M. Rusinowitch and M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science, 23rd Conference, Mumbai, India, December 2003, P.K. Pandya and J. Radhakrishnan, eds, Lecture Notes on Computer Science, Vol. 2914, Springer, 2003, pp. 124-135.
-
-
-
-
29
-
-
18544380224
-
An NP decision procedure for protocol insecurity with XOR
-
Y. Chevalier, R. Küsters, M. Rusinowitch and M. Turuani, An NP decision procedure for protocol insecurity with XOR, Theoretical Computer Science 338(1-3) (2005), 247-274.
-
(2005)
Theoretical Computer Science
, vol.338
, Issue.1-3
, pp. 247-274
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
30
-
-
68249109831
-
-
J. Clark and J. Jacob, A survey of authentication protocol literature: Version 1.0, Technical report, Department of Computer Science, University of York, November 1997
-
J. Clark and J. Jacob, A survey of authentication protocol literature: Version 1.0, Technical report, Department of Computer Science, University of York, November 1997.
-
-
-
-
31
-
-
0037271415
-
First-order verification of cryptographic protocols
-
E. Cohen, First-order verification of cryptographic protocols, Journal of Computer Security 11(2) (2003), 189-216.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 189-216
-
-
Cohen, E.1
-
32
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
Ottawa, ON, Canada, June, IEEE Computer Society
-
H. Comon-Lundh and V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, in: Symposium on Logic in Computer Science (LICS'03), Ottawa, ON, Canada, June 2003, IEEE Computer Society, 2003, pp. 271-280.
-
(2003)
Symposium on Logic in Computer Science (LICS'03)
, pp. 271-280
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
33
-
-
0034829261
-
Proving secrecy is easy enough
-
NS, Canada, June, IEEE Computer Society
-
V. Cortier, J. Millen and H. Rueß, Proving secrecy is easy enough, in: 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton, NS, Canada, June 2001, IEEE Computer Society, 2001, pp. 97-108.
-
(2001)
in: 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton
, pp. 97-108
-
-
Cortier, V.1
Millen, J.2
Rueß, H.3
-
35
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
A. Datta, A. Derek, J.C. Mitchell and D. Pavlovic, A derivation system and compositional logic for security protocols, Journal of Computer Security 13(3) (2005), 423-482.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
37
-
-
0003332235
-
A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios
-
Rutgers University, New Jersey, September
-
M. Debbabi, M. Mejri, N. Tawbi and I. Yahmadi, A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios, in: DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, New Jersey, September 1997.
-
(1997)
DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Debbabi, M.1
Mejri, M.2
Tawbi, N.3
Yahmadi, I.4
-
38
-
-
84976665942
-
-
D.E. Denning and G.M. Sacco, Timestamps in key distribution protocols, Commun. ACM 24(8) (1981), 533-536.
-
D.E. Denning and G.M. Sacco, Timestamps in key distribution protocols, Commun. ACM 24(8) (1981), 533-536.
-
-
-
-
41
-
-
35048902864
-
-
A. Durante, R. Focardi and R. Gorrieri, CVS at work: A report on new failures upon some cryptographic protocols, in: Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS'01), St. Petersburg, Russia, May 2001, V. Gorodetski, V. Skormin and L. Popyack, eds, Lecture Notes on Computer Science, 2052, Springer, 2001, pp. 287-299.
-
A. Durante, R. Focardi and R. Gorrieri, CVS at work: A report on new failures upon some cryptographic protocols, in: Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS'01), St. Petersburg, Russia, May 2001, V. Gorodetski, V. Skormin and L. Popyack, eds, Lecture Notes on Computer Science, Vol. 2052, Springer, 2001, pp. 287-299.
-
-
-
-
42
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
N. Durgin, P. Lincoln, J.C. Mitchell and A. Scedrov, Multiset rewriting and the complexity of bounded security protocols, Journal of Computer Security 12(2) (2004), 247-311.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.2
, pp. 247-311
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.C.3
Scedrov, A.4
-
43
-
-
33750477656
-
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
-
S. Escobar, C. Meadows and J. Meseguer, A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties, Theoretical Computer Science 367(1/2) (2006), 162-202.
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 162-202
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
44
-
-
34250834342
-
Equational cryptographic reasoning in the Maude-NRL protocol analyzer
-
S. Escobar, C. Meadows and J. Meseguer, Equational cryptographic reasoning in the Maude-NRL protocol analyzer, Electronic Notes in Theoretical Computer Science 171(4) (2007), 23-36.
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.171
, Issue.4
, pp. 23-36
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
45
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F.J.T. Fábrega, J.C. Herzog and J.D. Guttman, Strand spaces: Proving security protocols correct, Journal of Computer Security 7(2/3) (1999), 191-230.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
46
-
-
68249115226
-
-
personal communication
-
A. Gordon, personal communication.
-
-
-
Gordon, A.1
-
47
-
-
35248815623
-
Typing one-to-one and one-to-many correspondences in security protocols, in: Software Security - Theories and Systems
-
Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 2002, M. Okada, B. Pierce, A. Scedriv, H. Tokuda and A. Yonezawa, eds, Springer
-
A. Gordon and A. Jeffrey, Typing one-to-one and one-to-many correspondences in security protocols, in: Software Security - Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 2002, M. Okada, B. Pierce, A. Scedriv, H. Tokuda and A. Yonezawa, eds, Lecture Notes on Computer Science, Vol. 2609, Springer, 2002, pp. 263-282.
-
(2002)
Lecture Notes on Computer Science
, vol.2609
, pp. 263-282
-
-
Gordon, A.1
Jeffrey, A.2
-
48
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. Gordon and A. Jeffrey, Authenticity by typing for security protocols, Journal of Computer Security 11(4) (2003), 451-521.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 451-521
-
-
Gordon, A.1
Jeffrey, A.2
-
49
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. Gordon and A. Jeffrey, Types and effects for asymmetric cryptographic protocols, Journal of Computer Security 12(3/4) (2004), 435-484.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.1
Jeffrey, A.2
-
50
-
-
20144373910
-
Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically
-
J. Goubault-Larrecq, M. Roger and K.N. Verma, Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically, Journal of Logic and Algebraic Programming 64(2) (2005), 219-251.
-
(2005)
Journal of Logic and Algebraic Programming
, vol.64
, Issue.2
, pp. 219-251
-
-
Goubault-Larrecq, J.1
Roger, M.2
Verma, K.N.3
-
51
-
-
0037076868
-
Authentication tests and the structure of bundles
-
J.D. Guttman and F.J.T. Fábrega, Authentication tests and the structure of bundles, Theoretical Computer Science 283(2) (2002), 333-380.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 333-380
-
-
Guttman, J.D.1
Fábrega, F.J.T.2
-
52
-
-
0033683193
-
How to prevent type flaw attacks on security protocols
-
Cambridge, England, July
-
J. Heather, G. Lowe and S. Schneider, How to prevent type flaw attacks on security protocols, in: 13th IEEE Computer Security Foundations Workshop (CSFW-13), Cambridge, England, July 2000, pp. 255-268.
-
(2000)
13th IEEE Computer Security Foundations Workshop (CSFW-13)
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
53
-
-
14844344837
-
A decision procedure for the existence of a rank function
-
J. Heather and S. Schneider, A decision procedure for the existence of a rank function, Journal of Computer Security 13(2) (2005), 317-344.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.2
, pp. 317-344
-
-
Heather, J.1
Schneider, S.2
-
55
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems, Springer
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Tools and Algorithms for the Construction and Analysis of Systems, Lecture Notes on Computer Science, Vol. 1055, Springer, 1996, pp. 147-166.
-
(1996)
Lecture Notes on Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
56
-
-
0030708255
-
A hierarchy of authentication specifications
-
Rockport, MA, June, IEEE Computer Society
-
G. Lowe, A hierarchy of authentication specifications, in: 10th Computer Security Foundations Workshop (CSFW '97), Rockport, MA, June 1997, IEEE Computer Society, 1997, pp. 31-43.
-
(1997)
10th Computer Security Foundations Workshop (CSFW '97)
, pp. 31-43
-
-
Lowe, G.1
-
57
-
-
0030640054
-
Oriented equational logic programming is complete
-
C. Lynch, Oriented equational logic programming is complete, Journal of Symbolic Computation 21(1) (1997), 23-45.
-
(1997)
Journal of Symbolic Computation
, vol.21
, Issue.1
, pp. 23-45
-
-
Lynch, C.1
-
58
-
-
0030084918
-
An overview
-
The NRL protocol analyzer
-
C.A. Meadows, The NRL protocol analyzer: An overview, Journal of Logic Programming 26(2) (1996), 113-131.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.A.1
-
60
-
-
24144477933
-
Symbolic protocol analysis with an abelian group operator or DiffieHellman exponentiation
-
J. Millen and V. Shmatikov, Symbolic protocol analysis with an abelian group operator or DiffieHellman exponentiation, Journal of Computer Security 13(3) (2005), 515-564.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 515-564
-
-
Millen, J.1
Shmatikov, V.2
-
62
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Commun. ACM 21(12) (1978), 993-999.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
64
-
-
0023247970
-
Efficient and timely mutual authentication
-
D. Otway and O. Rees, Efficient and timely mutual authentication, Operating Systems Review 21(1) (1987), 8-10.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
65
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6(1/2) (1998), 85-128.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
66
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
A.W. Roscoe and P.J. Broadfoot, Proving security protocols with model checkers by data independence techniques, Journal of Computer Security 7(2/3) (1999), 147-190.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
-
67
-
-
0037453396
-
Protocol insecurity with finite number of sessions is NP-complete
-
M. Rusinowitch and M. Turuani, Protocol insecurity with finite number of sessions is NP-complete, Theoretical Computer Science 299(1-3) (2003), 451-475.
-
(2003)
Theoretical Computer Science
, vol.299
, Issue.1-3
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
-
68
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D.X. Song, S. Berezin and A. Perrig, Athena: a novel approach to efficient automatic security protocol analysis, Journal of Computer Security 9(1/2) (2001), 47-74.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.X.1
Berezin, S.2
Perrig, A.3
-
69
-
-
0003351702
-
A taxonomy of replay attacks
-
Franconia, NH, June, IEEE Computer Society
-
P. Syverson, A taxonomy of replay attacks, in: 7th IEEE Computer Security Foundations Workshop (CSFW-94), Franconia, NH, June 1994, IEEE Computer Society, 1994, pp. 131-136.
-
(1994)
7th IEEE Computer Security Foundations Workshop (CSFW-94)
, pp. 131-136
-
-
Syverson, P.1
-
70
-
-
0001937830
-
A formal language for cryptographic protocol requirements
-
P. Syverson and C. Meadows, A formal language for cryptographic protocol requirements, Designs, Codes, and Cryptography 7(1/2) (1996), 27-59.
-
(1996)
Designs, Codes, and Cryptography
, vol.7
, Issue.1-2
, pp. 27-59
-
-
Syverson, P.1
Meadows, C.2
-
71
-
-
84957640213
-
Towards an automatic analysis of security protocols in first-order logic
-
in: 16th International Conference on Automated Deduction CADE-16, Trento, Italy, July, H. Ganzinger, ed, Springer
-
C. Weidenbach, Towards an automatic analysis of security protocols in first-order logic, in: 16th International Conference on Automated Deduction (CADE-16), Trento, Italy, July 1999, H. Ganzinger, ed., Lecture Notes in Artificial Intelligence, Vol. 1632, Springer, 1999, pp. 314-328.
-
(1999)
Lecture Notes in Artificial Intelligence
, vol.1632
, pp. 314-328
-
-
Weidenbach, C.1
-
72
-
-
0026630927
-
Authentication for distributed systems
-
T.Y.C. Woo and S.S. Lam, Authentication for distributed systems, Computer 25(1) (1992), 39-52.
-
(1992)
Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
73
-
-
0027205880
-
A semantic model for authentication protocols
-
Oakland, CA, May
-
T.Y.C. Woo and S.S. Lam, A semantic model for authentication protocols, in: Proceedings IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1993, pp. 178-194.
-
(1993)
Proceedings IEEE Symposium on Research in Security and Privacy
, pp. 178-194
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
74
-
-
13644258471
-
Authentication for distributed systems
-
October, D. Denning and P. Denning, eds, ACM Press and Addison-Wesley
-
T.Y.C. Woo and S.S. Lam, Authentication for distributed systems, in: Internet Besieged: Countering Cyberspace Scofflaws, October 1997, D. Denning and P. Denning, eds, ACM Press and Addison-Wesley, 1997, pp. 319-355.
-
(1997)
Internet Besieged: Countering Cyberspace Scofflaws
, pp. 319-355
-
-
Woo, T.Y.C.1
Lam, S.S.2
|