-
1
-
-
38049061143
-
Security protocols: Principles and calculi
-
Aldini, A, Gorrieri, R, eds, FOSAD 2007, Springer, Heidelberg
-
Abadi, M.: Security protocols: Principles and calculi. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol. 4677, pp. 1-23. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4677
, pp. 1-23
-
-
Abadi, M.1
-
2
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. Journal of the ACM 52(1), 102-146 (2005)
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
24344493908
-
Computer-assisted verification of a protocol for certified email
-
Abadi, M., Blanchet, B.: Computer-assisted verification of a protocol for certified email. Science of Computer Programming 58(1-2), 3-27 (2005)
-
(2005)
Science of Computer Programming
, vol.58
, Issue.1-2
, pp. 3-27
-
-
Abadi, M.1
Blanchet, B.2
-
4
-
-
34547517142
-
Just Fast Keying in the pi calculus
-
Abadi, M., Blanchet, B., Fournet, C.: Just Fast Keying in the pi calculus. ACM Transactions on Information and System Security 10(3), 1-59 (2007)
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.3
, pp. 1-59
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
5
-
-
0035035153
-
Mobile values, new names, and secure communication
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: 28th ACM Symposium on Principles of Programming Languages, pp. 104-115 (2001)
-
(2001)
28th ACM Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
6
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: The spi calculus. Information and Computation 148(1), 1-70 (1999);
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
7
-
-
70350230935
-
-
An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149 January 1998
-
An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149 (January 1998)
-
-
-
-
8
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
Abadi, M., Rogaway, P.: Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology 15(2), 103-127 (2002)
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
9
-
-
84958762859
-
-
Amadio, R., Prasad, S.: The game of the name in cryptographic tables. In: Thiagarajan, P.S., Yap, R.H.C. (eds.) ASIAN 1999. LNCS, 1742, pp. 15-27. Springer, Heidelberg (1999)
-
Amadio, R., Prasad, S.: The game of the name in cryptographic tables. In: Thiagarajan, P.S., Yap, R.H.C. (eds.) ASIAN 1999. LNCS, vol. 1742, pp. 15-27. Springer, Heidelberg (1999)
-
-
-
-
10
-
-
50249164303
-
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
-
Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 202-215 (2008)
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 202-215
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
12
-
-
51249085821
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
Bellare, M., Namprempre, C.: Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. Journal of Cryptology 21(4), 469-491 (2008)
-
(2008)
Journal of Cryptology
, vol.21
, Issue.4
, pp. 469-491
-
-
Bellare, M.1
Namprempre, C.2
-
13
-
-
57849106656
-
Cryptographically verified implementations for TLS
-
Bhargavan, K., Fournet, C., Corin, R., Zalinescu, E.: Cryptographically verified implementations for TLS. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 459-468 (2008)
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 459-468
-
-
Bhargavan, K.1
Fournet, C.2
Corin, R.3
Zalinescu, E.4
-
14
-
-
14844303360
-
Verifying policy-based security for web services
-
Bhargavan, K., Fournet, C., Gordon, A.D.: Verifying policy-based security for web services. In: ACM Conference on Computer and Communications Security, pp. 268-277 (2004)
-
(2004)
ACM Conference on Computer and Communications Security
, pp. 268-277
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
15
-
-
33845212195
-
-
Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WS-security protocols. In: Bravetti, M., Núñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, 4184, pp. 88-106. Springer, Heidelberg (2006)
-
Bhargavan, K., Fournet, C., Gordon, A.D.: Verified reference implementations of WS-security protocols. In: Bravetti, M., Núñez, M., Zavattaro, G. (eds.) WS-FM 2006. LNCS, vol. 4184, pp. 88-106. Springer, Heidelberg (2006)
-
-
-
-
16
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: 14th IEEE Computer Security Foundations Workshop, pp. 82-96 (2001)
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
17
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: 2004 IEEE Symposium on Security and Privacy, pp. 86-100 (2004)
-
(2004)
2004 IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
Blanchet, B.1
-
18
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
Blanchet, B.: A computationally sound mechanized prover for security protocols. In: 2006 IEEE Symposium on Security and Privacy, pp. 140-154 (2006)
-
(2006)
2006 IEEE Symposium on Security and Privacy
, pp. 140-154
-
-
Blanchet, B.1
-
19
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
February-March
-
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1) (February-March 2008)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
20
-
-
50249162614
-
Automated formal analysis of a protocol for secure file sharing on untrusted storage
-
Blanchet, B., Chaudhuri, A.: Automated formal analysis of a protocol for secure file sharing on untrusted storage. In: 2008 IEEE Symposium on Security and Privacy, pp. 417-431 (2008)
-
(2008)
2008 IEEE Symposium on Security and Privacy
, pp. 417-431
-
-
Blanchet, B.1
Chaudhuri, A.2
-
21
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Gordon, A.D, ed, FOSSACS 2003, Springer, Heidelberg
-
Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. In: Gordon, A.D. (ed.) FOSSACS 2003. LNCS, vol. 2620, pp. 136-152. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2620
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
22
-
-
33749579704
-
Automated security proofs with sequences of games
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Blanchet, B., Pointcheval, D.: Automated security proofs with sequences of games. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 537-554. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 537-554
-
-
Blanchet, B.1
Pointcheval, D.2
-
24
-
-
0036308321
-
Proof techniques for cryptographic processes
-
Boreale, M., Nicola, R.D., Pugliese, R.: Proof techniques for cryptographic processes. SIAM Journal on Computing 31(3), 947-986 (2001)
-
(2001)
SIAM Journal on Computing
, vol.31
, Issue.3
, pp. 947-986
-
-
Boreale, M.1
Nicola, R.D.2
Pugliese, R.3
-
25
-
-
35048863862
-
Symbolic bisimulation in the spi calculus
-
Gardner, P, Yoshida, N, eds, CONCUR 2004, Springer, Heidelberg
-
Borgström, J., Briais, S., Nestmann, U.: Symbolic bisimulation in the spi calculus. In: Gardner, P., Yoshida, N. (eds.) CONCUR 2004. LNCS, vol. 3170, pp. 161-176. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3170
, pp. 161-176
-
-
Borgström, J.1
Briais, S.2
Nestmann, U.3
-
26
-
-
0000523051
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. Proceedings of the Royal Society of London A 426, 233-271 (1989);
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
27
-
-
70350243881
-
-
A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No, February
-
A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39 (February 1989)
-
(1989)
, vol.39
-
-
-
29
-
-
24144442872
-
A derivation system and compositional logic for security protocols
-
Datta, A., Derek, A., Mitchell, J.C., Pavlovic, D.: A derivation system and compositional logic for security protocols. Journal of Computer Security 13(3), 423-482 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 423-482
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Pavlovic, D.4
-
30
-
-
3042538976
-
Automatic testing equivalence verification of spi calculus specifications
-
Durante, L., Sisto, R., Valenzano, A.: Automatic testing equivalence verification of spi calculus specifications. ACM Transactions on Software Engineering and Methodology 12(2), 222-284 (2003)
-
(2003)
ACM Transactions on Software Engineering and Methodology
, vol.12
, Issue.2
, pp. 222-284
-
-
Durante, L.1
Sisto, R.2
Valenzano, A.3
-
31
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
Focardi, R., Gorrieri, R.: The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering 23(9), 550-571 (1997)
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
32
-
-
84869652482
-
-
Freier, A.O, Karlton, P, Kocher, P.C, The SSL protocol: Version 3.0 November 1996
-
Freier, A.O., Karlton, P., Kocher, P.C.: The SSL protocol: Version 3.0 (November 1996), http://www.mozilla.org/projects/security/pki/nss/ssl/draft302. txt
-
-
-
-
36
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
Cousot, R, ed, VMCAI 2005, Springer, Heidelberg
-
Goubault-Larrecq, J., Parrennes, F.: Cryptographic protocol analysis on real C code. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol. 3385, pp. 363-379. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
37
-
-
33745770376
-
A modular correctness proof of IEEE 802.11i and TLS
-
He, C., Sundararajan, M., Datta, A., Derek, A., Mitchell, J.C.: A modular correctness proof of IEEE 802.11i and TLS. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 2-15 (2005)
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 2-15
-
-
He, C.1
Sundararajan, M.2
Datta, A.3
Derek, A.4
Mitchell, J.C.5
-
39
-
-
23144432349
-
-
Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, 3444, pp. 186-200. Springer, Heidelberg (2005)
-
Kremer, S., Ryan, M.D.: Analysis of an electronic voting protocol in the applied pi calculus. In: Sagiv, M. (ed.) ESOP 2005. LNCS, vol. 3444, pp. 186-200. Springer, Heidelberg (2005)
-
-
-
-
40
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
41
-
-
33749070145
-
WSEmail: Secure internet messaging based on web services
-
Lux, K.D., May, M.J., Bhattad, N.L., Gunter, C.A.: WSEmail: Secure internet messaging based on web services. In: ICWS 2005: Proceedings of the IEEE International Conference on Web Services, pp. 75-82 (2005)
-
(2005)
ICWS 2005: Proceedings of the IEEE International Conference on Web Services
, pp. 75-82
-
-
Lux, K.D.1
May, M.J.2
Bhattad, N.L.3
Gunter, C.A.4
-
42
-
-
35048899313
-
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 133-151. Springer, Heidelberg (2004)
-
Micciancio, D., Warinschi, B.: Soundness of formal encryption in the presence of active adversaries. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 133-151. Springer, Heidelberg (2004)
-
-
-
-
43
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
Milner, R., Parrow, J., Walker, D.: A calculus of mobile processes, parts I and II. Information and Computation 100, 1-77 (1992)
-
(1992)
Information and Computation
, vol.100
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
44
-
-
58349099301
-
A modular security analysis of the TLS handshake protocol
-
Pieprzyk, J, ed, ASIACRYPT, Springer, Heidelberg
-
Morrissey, P., Smart, N.P., Warinschi, B.: A modular security analysis of the TLS handshake protocol. In: Pieprzyk, J. (ed.) ASIACRYPT. LNCS, vol. 5350, pp. 55-73. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 55-73
-
-
Morrissey, P.1
Smart, N.P.2
Warinschi, B.3
-
45
-
-
0031143949
-
The changing environment for security protocols
-
Needham, R.M.: The changing environment for security protocols. IEEE Network 11(3), 12-15 (1997)
-
(1997)
IEEE Network
, vol.11
, Issue.3
, pp. 12-15
-
-
Needham, R.M.1
-
47
-
-
35048876713
-
Probabilistic bisimulation and equivalence for security analysis of network protocols
-
Walukiewicz, I, ed, FOSSACS 2004, Springer, Heidelberg
-
Ramanathan, A., Mitchell, J., Scedrov, A., Teague, V.: Probabilistic bisimulation and equivalence for security analysis of network protocols. In: Walukiewicz, I. (ed.) FOSSACS 2004. LNCS, vol. 2987, pp. 468-483. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2987
, pp. 468-483
-
-
Ramanathan, A.1
Mitchell, J.2
Scedrov, A.3
Teague, V.4
|