-
1
-
-
23144463868
-
Analyzing Security Protocols with Secrecy Types and Logic Programs
-
January
-
Martín Abadi and Bruno Blanchet. Analyzing Security Protocols with Secrecy Types and Logic Programs. Journal of the ACM, 52(1):102-146, January 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
24344493908
-
-
Martín Abadi and Bruno Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. Science of Computer Programming, 58(1-2):3-27, OCT 2005. Special issue SAS'03.
-
Martín Abadi and Bruno Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. Science of Computer Programming, 58(1-2):3-27, OCT 2005. Special issue SAS'03.
-
-
-
-
3
-
-
28144458017
-
Reconstruction of Attacks against Cryptographic Protocols
-
Aix-en-Provence, France, JUN, IEEE Computer Society
-
Xavier Allamigeon and Bruno Blanchet. Reconstruction of Attacks against Cryptographic Protocols. In 18th IEEE Computer Security Foundations Workshop (CSFW-18), pages 140-154, Aix-en-Provence, France, JUN 2005. IEEE Computer Society.
-
(2005)
18th IEEE Computer Security Foundations Workshop (CSFW-18)
, pp. 140-154
-
-
Allamigeon, X.1
Blanchet, B.2
-
4
-
-
0001772130
-
Secrecy by typing in security protocols
-
Martín Abadi. Secrecy by typing in security protocols. J. ACM, 46(5):749-786, 1999.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
5
-
-
26444497860
-
-
Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, and Laurent Vigneron. The avispa tool for the automated validation of internet security protocols and applications. In CAV, pages 281-285, 2005.
-
Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, and Laurent Vigneron. The avispa tool for the automated validation of internet security protocols and applications. In CAV, pages 281-285, 2005.
-
-
-
-
6
-
-
0035035153
-
Mobile values, new names, and secure communication
-
Martín Abadi and Cédric Fournet. Mobile values, new names, and secure communication. SIGPLAN Not., 36(3):104-115, 2001.
-
(2001)
SIGPLAN Not
, vol.36
, Issue.3
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
8
-
-
0024880585
-
A logic of authentication
-
New York, NY, USA, ACM
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. In SOSP '89: Proceedings of the twelfth ACM symposium on Operating systems principles, pages 1-13, New York, NY, USA, 1989. ACM.
-
(1989)
SOSP '89: Proceedings of the twelfth ACM symposium on Operating systems principles
, pp. 1-13
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
9
-
-
24144452823
-
Static validation of security protocols
-
Chiara Bodei, Mikael Buchholtz, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson. Static validation of security protocols. J. Comput. Secur., 13(3):347-390, 2005.
-
(2005)
J. Comput. Secur
, vol.13
, Issue.3
, pp. 347-390
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Riis Nielson, H.5
-
10
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
Cape Breton, Nova Scotia, Canada, JUN, IEEE Computer Society
-
Bruno Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, JUN 2001. IEEE Computer Society.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 82-96
-
-
Blanchet, B.1
-
11
-
-
84958749546
-
From Secrecy to Authenticity in Security Protocols
-
Manuel Hermenegildo and Germán Puebla, editors, 9th International Static Analysis Symposium SAS'02, of, Madrid, Spain, SEP, Springer Verlag
-
Bruno Blanchet. From Secrecy to Authenticity in Security Protocols. In Manuel Hermenegildo and Germán Puebla, editors, 9th International Static Analysis Symposium (SAS'02), volume 2477 of Lecture Notes on Computer Science, pages 342-359, Madrid, Spain, SEP 2002. Springer Verlag.
-
(2002)
Lecture Notes on Computer Science
, vol.2477
, pp. 342-359
-
-
Blanchet, B.1
-
12
-
-
33751055370
-
Automatic Proof of Strong Secrecy for Security Protocols
-
Technical Report MPI-I-2004-NWG1-001, Max-Planck-Institut für Informatik, Saarbrücken, Germany, July
-
Bruno Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. Technical Report MPI-I-2004-NWG1-001, Max-Planck-Institut für Informatik, Saarbrücken, Germany, July 2004.
-
(2004)
-
-
Blanchet, B.1
-
14
-
-
84865526741
-
Automatic verification of correspondences for security protocols
-
abs/0802.3444
-
Bruno Blanchet. Automatic verification of correspondences for security protocols. CoRR, abs/0802.3444, 2008.
-
(2008)
CoRR
-
-
Blanchet, B.1
-
15
-
-
70350537298
-
Automatic verification of correspondences for security protocols
-
To appear
-
Bruno Blanchet. Automatic verification of correspondences for security protocols. Journal of Computer Security, 2008. To appear.
-
(2008)
Journal of Computer Security
-
-
Blanchet, B.1
-
16
-
-
35248837934
-
Hermes: An automatic tool for verification of secrecy in security protocols
-
Liana Bozga, Yassine Lakhnech, and Michaël Périn. Hermes: An automatic tool for verification of secrecy in security protocols. In C AV, pages 219-222, 2003.
-
(2003)
C AV
, pp. 219-222
-
-
Bozga, L.1
Lakhnech, Y.2
Périn, M.3
-
17
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Andrew Gordon, editor, Foundations of Software Science and Computation Structures FoSSaCS'03, of, Warsaw, Poland, April, Springer Verlag
-
Bruno Blanchet and Andreas Podelski. Verification of cryptographic protocols: Tagging enforces termination. In Andrew Gordon, editor, Foundations of Software Science and Computation Structures (FoSSaCS'03), volume 2620 of Lecture Notes on Computer Science, pages 136-152, Warsaw, Poland, April 2003. Springer Verlag.
-
(2003)
Lecture Notes on Computer Science
, vol.2620
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
18
-
-
48949088211
-
-
C.J.F. Cremers. The Scyther Tool: Verification, falsification, and analysis of security protocols. In Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc., 5123/2008 of Lecture Notes in Computer Science, pages 414-418. Springer, 2008.
-
C.J.F. Cremers. The Scyther Tool: Verification, falsification, and analysis of security protocols. In Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc., volume 5123/2008 of Lecture Notes in Computer Science, pages 414-418. Springer, 2008.
-
-
-
-
19
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
Nancy Durgin, Patrick Lincoln, John Mitchell, and Andre Scedrov. Multiset rewriting and the complexity of bounded security protocols. J. Comput. Secur., 12(2):247-311, 2004.
-
(2004)
J. Comput. Secur
, vol.12
, Issue.2
, pp. 247-311
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
21
-
-
33750477656
-
A rewriting-based inference system for the nrl protocol analyzer and its meta-logical properties
-
Santiago Escobar, Catherine Meadows, and José Meseguer. A rewriting-based inference system for the nrl protocol analyzer and its meta-logical properties. Theor. Comput. Sci., 367(1):162-202, 2006.
-
(2006)
Theor. Comput. Sci
, vol.367
, Issue.1
, pp. 162-202
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
22
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
12(3,4):435-483
-
Andrew D. Gordon and Alan Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Comput. Secur., 12(3,4):435-483, 2004.
-
(2004)
J. Comput. Secur
-
-
Gordon, A.D.1
Jeffrey, A.2
-
23
-
-
20144373910
-
Abstraction and resolution modulo ac: How to verify diffie-hellman-like protocols automatically
-
Jean Goubault-Larrecq, Muriel Roger, and Kumar Neeraj Verma. Abstraction and resolution modulo ac: How to verify diffie-hellman-like protocols automatically. Journal of Logic and Algebraic Programming, 64(2):219-251, 2005.
-
(2005)
Journal of Logic and Algebraic Programming
, vol.64
, Issue.2
, pp. 219-251
-
-
Goubault-Larrecq, J.1
Roger, M.2
Neeraj Verma, K.3
-
26
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Catherine Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
27
-
-
0013295165
-
A necessarily parallel attack
-
Nevin Heintze and Edmund Clarke, editors, Trento, Italy, July
-
Jonathan K. Millen. A necessarily parallel attack. In Nevin Heintze and Edmund Clarke, editors, Workshop on Formal Methods and Security Protocols, Part of the Federated Logic Conference, Trento, Italy, July 1999.
-
(1999)
Workshop on Formal Methods and Security Protocols, Part of the Federated Logic Conference
-
-
Millen, J.K.1
-
29
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. J. Comput. Secur., 6(1-2):85-128, 1998.
-
(1998)
J. Comput. Secur
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
30
-
-
0034315111
-
Key exchange in ipsec: Analysis of ike
-
Radia Perlman and Charlie Kaufman. Key exchange in ipsec: Analysis of ike. IEEE Internet Computing, 4(6):50-56, 2000.
-
(2000)
IEEE Internet Computing
, vol.4
, Issue.6
, pp. 50-56
-
-
Perlman, R.1
Kaufman, C.2
-
31
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
Washington, DC, USA, IEEE Computer Society
-
Dawn Xiaodong Song. Athena: a new efficient automatic checker for security protocol analysis. In CSFW '99: Proceedings of the 12th IEEE workshop on Computer Security Foundations, page 192, Washington, DC, USA, 1999. IEEE Computer Society.
-
(1999)
CSFW '99: Proceedings of the 12th IEEE workshop on Computer Security Foundations
, pp. 192
-
-
Xiaodong Song, D.1
-
33
-
-
0027205880
-
A semantic model for authentication protocols
-
Washington, DC, USA, IEEE Computer Society
-
Thomas Y. C. Woo and Simon S. Lam. A semantic model for authentication protocols. In SP '93: Proceedings of the 1993 IEEE Symposium on Security and Privacy, page 178, Washington, DC, USA, 1993. IEEE Computer Society.
-
(1993)
SP '93: Proceedings of the 1993 IEEE Symposium on Security and Privacy
, pp. 178
-
-
Woo, T.Y.C.1
Lam, S.S.2
|