-
1
-
-
28144451656
-
Deciding knowledge in security protocols under (many more) equational theories
-
IEEE Computer Society Press, Los Alamitos
-
Abadi, M., Cortier, V.: Deciding knowledge in security protocols under (many more) equational theories. In: Proceedings of CSFW 2005, pp. 62-76. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
Proceedings of CSFW 2005
, pp. 62-76
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Palamidessi C. (ed.) CONCUR 2000. Springer, Heidelberg
-
Amadio, R.M., Lugiez, D.: On the reachability problem in cryptographic protocols. In: Palamidessi, C. (ed.) CONCUR 2000. LNCS, vol.1877, pp. 380-394. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1877
, pp. 380-394
-
-
Amadio, R.M.1
Lugiez, D.2
-
3
-
-
40149109757
-
A framework for compositional veri.cation of security protocols
-
Andova, S., Cremers, C., Gjøsteen, K., Mauw, S., Mjølsnes, S., Radomirovic, S.: A framework for compositional veri.cation of security protocols. Information and Computation 206, 425-459 (2008)
-
(2008)
Information and Computation
, vol.206
, pp. 425-459
-
-
Andova, S.1
Cremers, C.2
Gjøsteen, K.3
Mauw, S.4
Mjølsnes, S.5
Radomirovic, S.6
-
4
-
-
58049112239
-
From one session to many: Dynamic tags for security protocols
-
Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. Springer, Heidelberg
-
Arapinis, M., Delaune, S., Kremer, S.: From one session to many: Dynamic tags for security protocols. In: Cervesato, I., Veith, H., Voronkov, A. (eds.) LPAR 2008. LNCS, vol.5330, pp. 128-142. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5330
, pp. 128-142
-
-
Arapinis, M.1
Delaune, S.2
Kremer, S.3
-
5
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drielsma, P., Héam, P.-C., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.3576, pp. 281-285. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Hankes Drielsma, P.7
Héam, P.-C.8
Mantovani, J.9
Mödersheim, S.10
Von Oheimb, D.11
Rusinowitch, M.12
Santiago, J.13
Turuani, M.14
Viganò, L.15
Vigneron, L.16
-
6
-
-
35048868416
-
LTL model checking for security protocols
-
IEEE Computer Society Press, Los Alamitos
-
Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. In: Proceedings of CSF 2007, pp. 385-396. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
Proceedings of CSF 2007
, pp. 385-396
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
-
11
-
-
33646262130
-
Algebraic intruder deductions
-
Sutcli.e, G., Voronkov, A. (eds.) LPAR 2005. Springer, Heidelberg
-
Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcli.e, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol.3835, pp. 549-564. Springer, Heidelberg (2005)
-
(2005)
LNCS (LNAI)
, vol.3835
, pp. 549-564
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
12
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
Basin, D., Mödersheim, S., Viganò, L.: OFMC: A symbolic model checker for security protocols. International Journal of Information Security 4(3), 181-208 (2005)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
13
-
-
0034822279
-
An e.cient cryptographic protocol veri.er based on prolog rules
-
IEEE Computer Society Press, Los Alamitos
-
Blanchet, B.: An e.cient cryptographic protocol veri.er based on prolog rules. In: Proceedings of CSFW 2001, pp. 82-96. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Proceedings of CSFW 2001
, pp. 82-96
-
-
Blanchet, B.1
-
14
-
-
0031074857
-
Fast planning through planning graph analysis
-
Blum, A.L., Furst, M.L.: Fast planning through planning graph analysis. Arti.cial Intelligence 90, 281-300 (1997)
-
(1997)
Arti.cial Intelligence
, vol.90
, pp. 281-300
-
-
Blum, A.L.1
Furst, M.L.2
-
15
-
-
84942246406
-
Automatic validation of protocol narration
-
IEEE Computer Society Press, Los Alamitos
-
Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Automatic validation of protocol narration. In: Proceedings of CSFW 2003, pp. 126-140. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proceedings of CSFW 2003
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Riis Nielson, H.5
-
16
-
-
70349336564
-
Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
-
Workshop (to appear in ENTCS)
-
Boichut, Y., Héam, P.-C., Kouchnarenko, O.: Tree automata for detecting attacks on protocols with algebraic cryptographic primitives. In: Proceedings of the INFINITY 2007 Workshop (2007) (to appear in ENTCS)
-
(2007)
Proceedings of the INFINITY 2007
-
-
Boichut, Y.1
Héam, P.-C.2
Kouchnarenko, O.3
-
17
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. Springer, Heidelberg
-
Boreale, M.: Symbolic trace analysis of cryptographic protocols. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol.2076, pp. 667-681. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
18
-
-
84874713281
-
A framework for the analysis of security protocols
-
Brim, L., Janicar, P., Kiretínsky, M., Kucera, A. (eds.) CONCUR 2002. Springer, Heidelberg
-
Boreale, M., Buscemi, M.G.: A framework for the analysis of security protocols. In: Brim, L., Janicar, P., Kiretínsky, M., Kucera, A. (eds.) CONCUR 2002. LNCS, vol.2421, pp. 483-498. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2421
, pp. 483-498
-
-
Boreale, M.1
Buscemi, M.G.2
-
20
-
-
84948759231
-
A formal analysis of some properties of Kerberos 5 using MSR
-
IEEE Computer Society Press, Los Alamitos
-
Butler, F., Cervesato, I., Jaggard, A., Scedrov, A.: A formal analysis of some properties of Kerberos 5 using MSR. In: Proceedings of CSFW 2002, pp. 175-190. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Proceedings of CSFW 2002
, pp. 175-190
-
-
Butler, F.1
Cervesato, I.2
Jaggard, A.3
Scedrov, A.4
-
21
-
-
0033698744
-
Relating strands and multiset rewriting for security protocol analysis
-
IEEE Computer Society Press, Los Alamitos
-
Cervesato, I., Durgin, N.A., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: Relating Strands and Multiset Rewriting for Security Protocol Analysis. In: Proceedings of CSFW 2000, pp. 35-51. IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
In: Proceedings of CSFW 2000
, pp. 35-51
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
22
-
-
35248865266
-
Deciding the security of protocols with di.e-hellman exponentiation and products in exponents
-
Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. Springer, Heidelberg
-
Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: Deciding the security of protocols with di.e-hellman exponentiation and products in exponents. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol.2914, pp. 124-135. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2914
, pp. 124-135
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
23
-
-
84944686372
-
A tool for lazy veri.cation of security protocols
-
IEEE Computer Society Press, Los Alamitos
-
Chevalier, Y., Vigneron, L.: A Tool for Lazy Veri.cation of Security Protocols. In: Proceedings of ASE 2001, pp. 373-376. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
In: Proceedings of ASE 2001
, pp. 373-376
-
-
Chevalier, Y.1
Vigneron, L.2
-
24
-
-
84937559950
-
Automated unbounded veri.cation of security protocols
-
Brinksma, E., Larsen, K.G. (eds.) CAV 2002. Springer, Heidelberg
-
Chevalier, Y., Vigneron, L.: Automated unbounded veri.cation of security protocols. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol.2404, pp. 324-337. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2404
, pp. 324-337
-
-
Chevalier, Y.1
Vigneron, L.2
-
25
-
-
84958742278
-
An improved constraint-based system for the veri.cation of security protocols
-
Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. Springer, Heidelberg
-
Corin, R., Etalle, S.: An improved constraint-based system for the veri.cation of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.2477, pp. 326-341. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2477
, pp. 326-341
-
-
Corin, R.1
Etalle, S.2
-
27
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
29
-
-
48949088211
-
The scyther tool: Veri.cation, falsi.cation, and analysis of security protocols
-
Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
-
Cremers, C.J.F.: The scyther tool: Veri.cation, falsi.cation, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol.5123, pp. 414-418. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5123
, pp. 414-418
-
-
Cremers, C.J.F.1
-
30
-
-
2642548302
-
Secure protocol composition
-
ACM Press, New York
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: Secure protocol composition. In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, pp. 11-23. ACM Press, New York (2003)
-
(2003)
Proceedings of the 2003 ACM Workshop on Formal Methods in Security Engineering
, pp. 11-23
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
31
-
-
51749097358
-
Composition of password-based protocols
-
IEEE Computer Society Press, Los Alamitos
-
Delaune, S., Kremer, S., Ryan, M.D.: Composition of password-based protocols. In: Proceedings of CSF 2008, pp. 239-251. IEEE Computer Society Press, Los Alamitos (2008)
-
(2008)
Proceedings of CSF 2008
, pp. 239-251
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
32
-
-
0003902378
-
The CAPSL Integrated Protocol Environment
-
SRI International, Menlo Park, CA
-
Denker, G., Millen, J.K., Rueß, H.: The CAPSL Integrated Protocol Environment. Technical Report SRI-CSL-2000-2002, SRI International, Menlo Park, CA (2000)
-
(2000)
Technical Report SRI-CSL-2000-2002
-
-
Denker, G.1
Millen, J.K.2
Rueß, H.3
-
35
-
-
0042500424
-
Undecidability of bounded security protocols
-
FMSP 1999
-
Durgin, N., Lincoln, P.D., Mitchell, J.C., Scedrov, A.: Undecidability of Bounded Security Protocols. In: Proceedings of the FLOC'99 Workshop on Formal Methods and Security Protocols, FMSP 1999 (1999)
-
(1999)
Proceedings of the FLOC'99 Workshop on Formal Methods and Security Protocols
-
-
Durgin, N.1
Lincoln, P.D.2
Mitchell, J.C.3
Scedrov, A.4
-
37
-
-
0034829105
-
Computing symbolic models for verifying cryptographic protocols
-
IEEE Computer Society Press, Los Alamitos
-
Fiore, M., Abadi, M.: Computing Symbolic Models for Verifying Cryptographic Protocols. In: Proceedings of CSFW 2001, pp. 160-173. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Proceedings of CSFW 2001
, pp. 160-173
-
-
Fiore, M.1
Abadi, M.2
-
38
-
-
84937389998
-
Rewriting for cryptographic protocol veri.cation
-
McAllester D. (ed.) CADE 2000. Springer, Heidelberg
-
Genet, T., Klay, F.: Rewriting for cryptographic protocol veri.cation. In: McAllester, D. (ed.) CADE 2000. LNCS, vol.1831, pp. 271-290. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1831
, pp. 271-290
-
-
Genet, T.1
Klay, F.2
-
39
-
-
84876354671
-
A method for automatic cryptographic protocol veri.cation
-
Rolim J.D.P. (ed.) IPDPS-WS 2000. Springer, Heidelberg
-
Goubault-Larrecq, J.: A method for automatic cryptographic protocol veri.cation. In: Rolim, J.D.P. (ed.) IPDPS-WS 2000. LNCS, vol.1800, pp. 977-984. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1800
, pp. 977-984
-
-
Goubault-Larrecq, J.1
-
40
-
-
3042563843
-
Authentication tests and disjoint encryption: A design method for security protocols
-
Guttman, J.D.: Authentication tests and disjoint encryption: a design method for security protocols. Journal of Computer Security 3-4(12), 409-433 (2004)
-
(2004)
Journal of Computer Security
, vol.3-4
, Issue.12
, pp. 409-433
-
-
Guttman, J.D.1
-
41
-
-
70349303077
-
Cryptographic protocol composition via the authentication tests
-
De Alfaro L. (ed.) FOSSACS 2009. Springer, Heidelberg
-
Guttman, J.D.: Cryptographic protocol composition via the authentication tests. In: de Alfaro, L. (ed.) FOSSACS 2009. LNCS, vol.5504, pp. 303-317. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5504
, pp. 303-317
-
-
Guttman, J.D.1
-
42
-
-
38049169637
-
Formalizing and analyzing sender invariance
-
Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. Springer, Heidelberg
-
Hankes Drielsma, P., Mödersheim, S., Viganò, L., Basin, D.: Formalizing and analyzing sender invariance. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol.4691, pp. 80-95. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4691
, pp. 80-95
-
-
Hankes Drielsma, P.1
Mödersheim, S.2
Viganò, L.3
Basin, D.4
-
45
-
-
70349308077
-
-
ITU-T Recommendation H.530, Corrigendum 1
-
ITU-T Recommendation H.530, Corrigendum 1 (2003); Corrected version of [44]
-
(2003)
Corrected Version of [44]
-
-
-
46
-
-
84956860311
-
Compiling and verifying security protocols
-
Parigot, M., Voronkov, A. (eds.) LPAR 2000. Springer, Heidelberg
-
Jacquemard, F., Rusinowitch, M., Vigneron, L.: Compiling and verifying security protocols. In: Parigot, M., Voronkov, A. (eds.) LPAR 2000. LNCS, vol.1955, pp. 131-160. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
48
-
-
0030708255
-
A hierarchy of authentication speci.cations
-
IEEE Computer Society Press, Los Alamitos
-
Lowe, G.: A hierarchy of authentication speci.cations. In: Proceedings of CSFW 1997, pp. 31-43. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
Proceedings of CSFW 1997
, pp. 31-43
-
-
Lowe, G.1
-
49
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe, G.: Casper: a Compiler for the Analysis of Security Protocols. Journal of Computer Security 6(1), 53-84 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 53-84
-
-
Lowe, G.1
-
50
-
-
0030232808
-
A calculus for security bootstrapping in distributed systems
-
Maurer, U.M., Schmid, P.E.: A calculus for security bootstrapping in distributed systems. Journal of Computer Security 4(1), 55-80 (1996)
-
(1996)
Journal of Computer Security
, vol.4
, Issue.1
, pp. 55-80
-
-
Maurer, U.M.1
Schmid, P.E.2
-
51
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C.: The NRL Protocol Analyzer: An Overview. Journal of Logic Programming 26(2), 113-131 (1996)
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
53
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
ACM Press, New York
-
Millen, J.K., Shmatikov, V.: Constraint Solving for Bounded-Process Cryptographic Protocol Analysis. In: Proceedings of CCS 2001, pp. 166-175. ACM Press, New York (2001)
-
(2001)
Proceedings of CCS 2001
, pp. 166-175
-
-
Millen, J.K.1
Shmatikov, V.2
-
55
-
-
40149098057
-
On the relationships between models in protocol veri.cation
-
Mödersheim, S.: On the Relationships between Models in Protocol Veri.cation. Information and Computation 206(2-4), 291-311 (2008)
-
(2008)
Information and Computation
, vol.206
, Issue.2-4
, pp. 291-311
-
-
Mödersheim, S.1
-
56
-
-
70349673925
-
Algebraic properties in alice and bob notation
-
IEEE Xplore
-
Mödersheim, S.: Algebraic Properties in Alice and Bob Notation. In: Proceedings of Ares 2009, pp. 433-440. IEEE Xplore (2009)
-
(2009)
Proceedings of Ares
, pp. 433-440
-
-
Mödersheim, S.1
-
60
-
-
70349330364
-
Constraint di.erentiation: Search-space reduction for the constraint-based analysis of security protocols
-
to appear
-
Mödersheim, S., Viganò, L., Basin, D.: Constraint Di.erentiation: Search-Space Reduction for the Constraint-Based Analysis of Security Protocols. Journal of Computer Security (to appear)
-
Journal of Computer Security
-
-
Mödersheim, S.1
Viganò, L.2
Basin, D.3
-
61
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C.: The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security 6(1), 85-128 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.C.1
-
62
-
-
84863913545
-
Ten Years of Partial Order Reduction
-
Computer Aided Verification
-
Peled, D.: Ten Years of Partial Order Reduction. In: Y. Vardi, M. (ed.) CAV 1998. LNCS, vol.1427, pp. 17-28. Springer, Heidelberg (1998) (Pubitemid 128092321)
-
(1998)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1427
, pp. 17-28
-
-
Peled, D.1
-
63
-
-
0003777431
-
-
i Addison-Wesley, Reading
-
Ryan, P., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, B.: Modelling and Analysis of Security Protocols. Addison-Wesley, Reading (2000)
-
(2000)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
65
-
-
33749413267
-
The cl-atse protocol analyzer
-
Pfenning F. (ed.) RTA 2006. Springer, Heidelberg
-
Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol.4098, pp. 277-286. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4098
, pp. 277-286
-
-
Turuani, M.1
|