-
1
-
-
35048861871
-
Just Fast Keying in the Pi Calculus
-
D. Schmidt, editor, The European Symposium on Programming (ESOP), Springer-Verlag
-
M. Abadi, B. Blanchet, and C. Fournet. Just Fast Keying in the Pi Calculus. In D. Schmidt, editor, The European Symposium on Programming (ESOP), Lecture Notes inComputer Science 2618. Springer-Verlag, 2004.
-
(2004)
Lecture Notes inComputer Science
, vol.2618
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
2
-
-
0003092378
-
A Calculus for Cryptographic Protocols: The Spi Calculus
-
M. Abadi and A. Gordan. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1):1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordan, A.2
-
3
-
-
3142632089
-
Just Fast Keying: Key Aggrement in a Hostile Internet
-
W. Aiello, S. Bellovin, M. Blaze, R. Caetti, J. Ioannidis, A. Keromytis, and O. Reingold. Just Fast Keying: Key Aggrement in a Hostile Internet. ACM Transactions of Information System Security, 7(2):242-273, 2004.
-
(2004)
ACM Transactions of Information System Security
, vol.7
, Issue.2
, pp. 242-273
-
-
Aiello, W.1
Bellovin, S.2
Blaze, M.3
Caetti, R.4
Ioannidis, J.5
Keromytis, A.6
Reingold, O.7
-
4
-
-
0034592864
-
Verisim: Formal analysis of network simulations
-
M. J. Harrold, editor Portland, OR, August ACM
-
K. Bhargavan, C. A. Gunter, M. Kim, I. Lee, D. Obradovic, O. Sokolsky, and M. Viswanathan. Verisim: Formal analysis of network simulations. In M. J. Harrold, editor, ISSTA 00 Proceedings of the ACM SIGSOFT 2000 International Symposium on Software Testing and Analysis, pages 2-13, Portland, OR, August 2000. ACM.
-
(2000)
ISSTA 00 Proceedings of the ACM SIGSOFT 2000 International Symposium on Software Testing and Analysis
, pp. 2-13
-
-
Bhargavan, K.1
Gunter, C.A.2
Kim, M.3
Lee, I.4
Obradovic, D.5
Sokolsky, O.6
Viswanathan, M.7
-
5
-
-
0036473405
-
Verisim: Formal analysis of network simulations
-
February
-
K. Bhargavan, C. A. Gunter, M. Kim, I. Lee, D. Obradovic, O. Sokolsky, and M. Viswanathan. Verisim: Formal analysis of network simulations. IEEE Transactions on Software Engineering, 28(2):129-145, February 2002.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.2
, pp. 129-145
-
-
Bhargavan, K.1
Gunter, C.A.2
Kim, M.3
Lee, I.4
Obradovic, D.5
Sokolsky, O.6
Viswanathan, M.7
-
6
-
-
77954002789
-
Routing information protocol in HOL/SPIN
-
J. Harrison and M. Aagaard, editors, Theorem Proving in Higher Order Logics: 13th International Conference, TPHOLs 2000 Portland, Oregon, August Springer-Verlag
-
K. Bhargavan, C. A. Gunter, and D. Obradovic. Routing information protocol in HOL/SPIN. In J. Harrison and M. Aagaard, editors, Theorem Proving in Higher Order Logics: 13th International Conference, TPHOLs 2000, volume 1869 of Lecture Notes in Computer Science, pages 53-72, Portland, Oregon, August 2000. Springer-Verlag.
-
(2000)
Lecture Notes in Computer Science
, vol.1869
, pp. 53-72
-
-
Bhargavan, K.1
Gunter, C.A.2
Obradovic, D.3
-
7
-
-
0346263728
-
Formal verification of standards for distance vector routing protocols
-
July
-
K. Bhargavan, D. Obradovic, and C. A. Gunter. Formal verification of standards for distance vector routing protocols. Journal of the ACM, 49(4):538-576, July 2002.
-
(2002)
Journal of the ACM
, vol.49
, Issue.4
, pp. 538-576
-
-
Bhargavan, K.1
Obradovic, D.2
Gunter, C.A.3
-
8
-
-
84958749546
-
From Secrecy to Authencity in Security Protocols
-
9th International Static Analysis Symposium (SAS'02), Springer-Verlag
-
B. Blanchet. From Secrecy to Authencity in Security Protocols. In 9th International Static Analysis Symposium (SAS'02), Lecture Notes In Computer Science 2477, pages 342-359. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2477
, pp. 342-359
-
-
Blanchet, B.1
-
9
-
-
3543058869
-
Automatic Proof of Strong Secrecy for Security Protocols
-
B. Blanchet. Automatic Proof of Strong Secrecy for Security Protocols. In IEEE Symposium on Security and Privacy, pages 86-100, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
Blanchet, B.1
-
13
-
-
18944369355
-
-
March
-
M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-Oliet, J. Meseguer, and J. Quesada. A Tutorial on Maude. http://maude.csl.sri.com, March 2000.
-
(2000)
A Tutorial on Maude
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Quesada, J.7
-
14
-
-
0037190144
-
Maude: Specification and programming in rewriting logic
-
M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-Oliet, J. Meseguer, and J. Quesada. Maude: specification and programming in rewriting logic. Theoretical Computer Science, 285:187-243, 2002.
-
(2002)
Theoretical Computer Science
, vol.285
, pp. 187-243
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Quesada, J.7
-
15
-
-
9444273584
-
-
June
-
M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-Oliet, J. Meseguer, and C. Talcott. Maude 2.0 Manual. June 2003, http://maude.cs.uiuc. edu.
-
(2003)
Maude 2.0 Manual
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Talcott, C.7
-
18
-
-
35248898082
-
-
RFC 3141, IETF
-
T. Hiller, P. Walsh, X. Chen, M. Munson, G. Dommety, S. Sivalingham, B. Lim, P. McCann, H. Shiino, B. Hirschman, S. Manning, R. Hsu, R. Hsu, M. Lipford, P. Calhoun, C. Lo, E. Jaques, E. Campbell, Y. Xu, S. Baba, T. Ayaki, T. Seki, and A. Hammed. CDMA2000 Wireless Data Reqirements for AAA. RFC 3141, IETF, 2001.
-
(2001)
CDMA2000 Wireless Data Reqirements for AAA
-
-
Hiller, T.1
Walsh, P.2
Chen, X.3
Munson, M.4
Dommety, G.5
Sivalingham, S.6
Lim, B.7
McCann, P.8
Shiino, H.9
Hirschman, B.10
Manning, S.11
Hsu, R.12
Hsu, R.13
Lipford, M.14
Calhoun, P.15
Lo, C.16
Jaques, E.17
Campbell, E.18
Xu, Y.19
Baba, S.20
Ayaki, T.21
Seki, T.22
Hammed, A.23
more..
-
22
-
-
30844441284
-
Charging, Accounting, and Biling Management Schemes in Mobile Telecommuncations Networks and the Internet
-
M. Koutsopoulou, A. Kaloxylos, A. Alonistioti, L. Merakos, and K. Kawamura. Charging, Accounting, and Biling Management Schemes in Mobile Telecommuncations Networks and the Internet. IEEE Communications Surveys, 6(1), 2004.
-
(2004)
IEEE Communications Surveys
, vol.6
, Issue.1
-
-
Koutsopoulou, M.1
Kaloxylos, A.2
Alonistioti, A.3
Merakos, L.4
Kawamura, K.5
-
23
-
-
28144456308
-
An Attack on the Needham-Schroeder Public-Key Auntentication Protocol
-
G. Lowe. An Attack on the Needham-Schroeder Public-Key Auntentication Protocol. Information Processing Letters, 56(3):131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
24
-
-
77953971250
-
-
November
-
K. McMillan. The SMV Manual. November 2000, http://www-2.cs.cmu.edu/ ~modelcheck/smv.html.
-
(2000)
The SMV Manual
-
-
McMillan, K.1
-
27
-
-
0027113376
-
Conditional rewriting logic as a unified model of concurrency
-
J. Meseguer. Conditional rewriting logic as a unified model of concurrency. Theoretical Computer Science, 96:73-155, 1992.
-
(1992)
Theoretical Computer Science
, vol.96
, pp. 73-155
-
-
Meseguer, J.1
-
28
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
L. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. J. Computer Security, 6:85-128, 1998.
-
(1998)
J. Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.1
|