-
1
-
-
24344493908
-
Computer-assisted verification of a protocol for certified email
-
Abadi M., and Blanchet B. Computer-assisted verification of a protocol for certified email. Science of Computer Programming 58 1-2 (2005) 3-27
-
(2005)
Science of Computer Programming
, vol.58
, Issue.1-2
, pp. 3-27
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
2942563373
-
A calculus for cryptographic protocols the spi calculus
-
Abadi M., and Gordon A.D. A calculus for cryptographic protocols the spi calculus. Digital SRC Research Report 149 (1998)
-
(1998)
Digital SRC Research Report
, vol.149
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
33750246447
-
-
W3C Recommendation
-
Bajaj S., Box D., Chappell D., Curbera F., Daniels G., Hallam-Baker P., et al. Web services policy 1.2-framework (WS-policy) (2006), W3C Recommendation
-
(2006)
Web services policy 1.2-framework (WS-policy)
-
-
Bajaj, S.1
Box, D.2
Chappell, D.3
Curbera, F.4
Daniels, G.5
Hallam-Baker, P.6
-
6
-
-
27544490737
-
-
W3C Recommendation
-
Bajaj S., Box D., Chappell D., Curbera F., Daniels G., Hallam-Baker P., et al. Web services policy 1.2-attachment (WS-policyattachment) (2006), W3C Recommendation
-
(2006)
Web services policy 1.2-attachment (WS-policyattachment)
-
-
Bajaj, S.1
Box, D.2
Chappell, D.3
Curbera, F.4
Daniels, G.5
Hallam-Baker, P.6
-
11
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Blanchet B. An efficient cryptographic protocol verifier based on prolog rules. In: IEEE Computer Security Foundations Workshop; 2001. pp. 82-96.
-
(2001)
IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
14
-
-
24144470036
-
-
Goubault-Larrecq J, Parrennes F. Cryptographic protocol analysis on real C code. In: Verification, Model Checking, and Abstract Interpretation; 2005. pp. 363-79.
-
Goubault-Larrecq J, Parrennes F. Cryptographic protocol analysis on real C code. In: Verification, Model Checking, and Abstract Interpretation; 2005. pp. 363-79.
-
-
-
-
17
-
-
33744474077
-
-
Jeon CW, Kim IG, Choi JY. Automatic generation of the C# code for security protocols verified with casper/FDR. In: International Conference on Advanced Information Networking and Applications; 2005. pp. 507-10.
-
Jeon CW, Kim IG, Choi JY. Automatic generation of the C# code for security protocols verified with casper/FDR. In: International Conference on Advanced Information Networking and Applications; 2005. pp. 507-10.
-
-
-
-
18
-
-
33745178885
-
Verification of low-level crypto-protocol implementations using automated theorem proving
-
Jürjens J. Verification of low-level crypto-protocol implementations using automated theorem proving. In: Formal Methods and Models for Co-Design; 2005. pp. 89-98.
-
(2005)
Formal Methods and Models for Co-Design
, pp. 89-98
-
-
Jürjens, J.1
-
19
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
Milner R., Parrow J., and Walker D. A calculus of mobile processes, parts I and II. Information and Computation 100 1 (1992) 1-77
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
22
-
-
48049092340
-
An experiment in interoperable cryptographic protocol implementation using automatic code generation
-
Pironti A, Sisto R. An experiment in interoperable cryptographic protocol implementation using automatic code generation. In: IEEE Symposium on Computers and Communications; 2007. pp. 839-44.
-
(2007)
IEEE Symposium on Computers and Communications
, pp. 839-844
-
-
Pironti, A.1
Sisto, R.2
-
23
-
-
58449090669
-
Formally sound refinement of Spi Calculus protocol specifications into Java code
-
Pironti A, Sisto R. Formally sound refinement of Spi Calculus protocol specifications into Java code. In: IEEE High Assurance Systems Engineering Symposium; 2008a. pp. 241-50.
-
(2008)
IEEE High Assurance Systems Engineering Symposium
, pp. 241-250
-
-
Pironti, A.1
Sisto, R.2
-
26
-
-
3042621964
-
-
Pozza D, Sisto R, Durante L. Spi2java: automatic cryptographic protocol java code generation from spi calculus. In: International Conference on Advanced Information Networking and Applications; 2004. pp. 400-05.
-
Pozza D, Sisto R, Durante L. Spi2java: automatic cryptographic protocol java code generation from spi calculus. In: International Conference on Advanced Information Networking and Applications; 2004. pp. 400-05.
-
-
-
-
27
-
-
18944395915
-
Formalizing java-MaC
-
Sammapun U., Sharykin R., DeLap M., Kim M., and Zdancewic S. Formalizing java-MaC. Electronic Notes in Theoretical Computer Science 89 2 (2003) 171-190
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.89
, Issue.2
, pp. 171-190
-
-
Sammapun, U.1
Sharykin, R.2
DeLap, M.3
Kim, M.4
Zdancewic, S.5
-
28
-
-
18144362508
-
ASM refinement and generalizations of forward simulation in data refinement: a comparison
-
Schellhorn G. ASM refinement and generalizations of forward simulation in data refinement: a comparison. Theoretical Computer Science 336 2-3 (2005) 403-435
-
(2005)
Theoretical Computer Science
, vol.336
, Issue.2-3
, pp. 403-435
-
-
Schellhorn, G.1
|