-
1
-
-
0003092378
-
A Calculus for Cryptographic Protocols: The Spi Calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999. (Pubitemid 129608821)
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). Journal of Cryptology, 15(2):103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
4
-
-
28144460109
-
Computational and information-theoretic soundness and completeness of formal encryption
-
IEEE Computer Society Press
-
P. Adão, G. Bana, and A. Scedrov. Computational and information-theoretic soundness and completeness of formal encryption. In Proc. 18th IEEE Computer Security Foundations Workshop (CSFW'05), pages 170-184. IEEE Computer Society Press, 2005.
-
(2005)
Proc. 18th IEEE Computer Security Foundations Workshop (CSFW'05)
, pp. 170-184
-
-
Adão, P.1
Bana, G.2
Scedrov, A.3
-
6
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society Press
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01), pages 82-96. IEEE Computer Society Press, 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01)
, pp. 82-96
-
-
Blanchet, B.1
-
7
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
13
-
-
35248868917
-
Modeling adversaries in a logic for reasoning about security protocols
-
Proc. Workshop on Formal Aspects of Security (FASec'02)
-
J. Y. Halpern and R. Pucella. Modeling adversaries in a logic for reasoning about security protocols. In Proc. Workshop on Formal Aspects of Security (FASec'02), volume 2629 of Lecture Notes in Computer Science, pages 115-132, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2629
, pp. 115-132
-
-
Halpern, J.Y.1
Pucella, R.2
-
16
-
-
31844443143
-
Possibilistic information flow control in the presence of encrypted communication
-
Proc. 9th European Symposium on Research in Computer Security (ESORICS'04), Springer-Verlag
-
D. Hutter and A. Schairer. Possibilistic information flow control in the presence of encrypted communication. In Proc. 9th European Symposium on Research in Computer Security (ESORICS'04), volume 3193 of Lecture Notes in Computer Science, pages 209-224. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 209-224
-
-
Hutter, D.1
Schairer, A.2
-
18
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 6:53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 53-84
-
-
Lowe, G.1
-
20
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1/2):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
21
-
-
0000937825
-
Verifying authentication protocols in CSP
-
S. Schneider. Verifying authentication protocols in CSP. IEEE Transactions on Software Engineering, 24(9):741-758, 1998. (Pubitemid 128741979)
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.9
, pp. 741-758
-
-
Schneider, S.1
|