-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi. Secrecy by typing in security protocols. JACM, 46(5):749-786, 1999.
-
(1999)
JACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
51249085821
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
M. Bellare and C. Namprempre. Authenticated encryption: Relations among notions and analysis of the generic composition paradigm. J. Cryptology, 21(4), 2008.
-
(2008)
J. Cryptology
, vol.21
, Issue.4
-
-
Bellare, M.1
Namprempre, C.2
-
3
-
-
77149149911
-
-
Technical Report MSR- TR-2008-2118, Microsoft Research, See also CSF'08
-
J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis. Refinement types for secure implementations. Technical Report MSR- TR-2008-2118, Microsoft Research, 2008. See also CSF'08.
-
(2008)
Refinement Types for Secure Implementations
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
5
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In CSFW'06, 2006b.
-
(2006)
CSFW'06
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
6
-
-
57849106656
-
Cryptographically verified implementations for TLS
-
K. Bhargavan, C. Fournet, R. Corin, and E. Zalinescu. Cryptographically verified implementations for TLS. In ACM CCS, pages 459-468, 2008a.
-
(2008)
ACM CCS
, pp. 459-468
-
-
Bhargavan, K.1
Fournet, C.2
Corin, R.3
Zalinescu, E.4
-
7
-
-
67649884132
-
Verified implementations of the Information Card federated identity-management protocol
-
K. Bhargavan, C. Fournet, A. D. Gordon, and N. Swamy. Verified implementations of the Information Card federated identity-management protocol. In ASIACCS'08, pages 123-135, 2008b.
-
(2008)
ASIACCS'08
, pp. 123-135
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Swamy, N.4
-
8
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In CSFW'01, pages 82-96, 2001.
-
(2001)
CSFW'01
, pp. 82-96
-
-
Blanchet, B.1
-
10
-
-
40149083066
-
Breaking and fixing public-key Kerberos
-
I. Cervesato, A. D. Jaggard, A. Scedrov, J.-K. Tsay, and C.Walstad. Breaking and fixing public-key Kerberos. Information and Computation, 206 (2-4):402-424, 2008.
-
(2008)
Information and Computation
, vol.206
, Issue.2-4
, pp. 402-424
-
-
Cervesato, I.1
Jaggard, A.D.2
Scedrov, A.3
Tsay, J.-K.4
Walstad, C.5
-
11
-
-
70350543796
-
ASPIER: An automated framework for verifying security protocol implementations
-
S. Chaki and A. Datta. ASPIER: An automated framework for verifying security protocol implementations. In CSF'09, 2009.
-
(2009)
CSF'09
-
-
Chaki, S.1
Datta, A.2
-
12
-
-
0033718532
-
TAPS: A first-order verifier for cryptographic protocols
-
E. Cohen. TAPS: A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop, pages 144-158, 2000.
-
(2000)
13th IEEE Computer Security Foundations Workshop
, pp. 144-158
-
-
Cohen, E.1
-
13
-
-
45749085681
-
Z3: An efficient SMT solver
-
Springer, LNCS 4963
-
L. de Moura and N. Bjørner. Z3: An efficient SMT solver. In TACAS'08, pages 337-340. Springer, 2008. LNCS 4963.
-
(2008)
TACAS'08
, pp. 337-340
-
-
De Moura, L.1
Bjørner, N.2
-
15
-
-
33745822823
-
Hybrid type checking
-
C. Flanagan. Hybrid type checking. In ACM POPL'06, pages 245-256, 2006.
-
(2006)
ACM POPL'06
, pp. 245-256
-
-
Flanagan, C.1
-
16
-
-
0141863341
-
Authenticity by typing for security protocols
-
A. D. Gordon and A. S. A. Jeffrey. Authenticity by typing for security protocols. J. Computer Security, 11(4):451-521, 2003a.
-
(2003)
J. Computer Security
, vol.11
, Issue.4
, pp. 451-521
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
17
-
-
3042660681
-
Types and effects for asymmetric cryptographic protocols
-
A. D. Gordon and A. S. A. Jeffrey. Types and effects for asymmetric cryptographic protocols. J. Computer Security, 12(3/4):435-484, 2003b.
-
(2003)
J. Computer Security
, vol.12
, Issue.3-4
, pp. 435-484
-
-
Gordon, A.D.1
Jeffrey, A.S.A.2
-
18
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In VMCAI'05, pages 363-379, 2005.
-
(2005)
VMCAI'05, Pages
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
20
-
-
33845203832
-
On the relationship between web services security and traditional protocols
-
E. Kleiner and A. W. Roscoe. On the relationship between web services security and traditional protocols. In MFPS XXI, 2005.
-
(2005)
MFPS
, vol.21
-
-
Kleiner, E.1
Roscoe, A.W.2
-
21
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
LNCS 1055
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In TACAS, pages 147-166, 1996. LNCS 1055.
-
(1996)
TACAS
, pp. 147-166
-
-
Lowe, G.1
-
22
-
-
0015561577
-
Protection in programming languages
-
J. H. Morris, Jr. Protection in programming languages. Commun. ACM, 16 (1):15-21, 1973.
-
(1973)
Commun. ACM
, vol.16
, Issue.1
, pp. 15-21
-
-
Morris Jr., J.H.1
-
23
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
24
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6:85-128, 1998.
-
(1998)
J. Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.1
-
25
-
-
77149165015
-
-
Cambridge University lecture notes
-
L. C. Paulson. Logic and proof. Cambridge University lecture notes, 2008.
-
(2008)
Logic and Proof
-
-
Paulson, L.C.1
|