-
2
-
-
77952332440
-
Formal support to security protocol development: A survey
-
Juan Carlos, L.P., Monroy, R.: Formal support to security protocol development: A survey. Computacion y Sistemas 12(1), 89-108 (2008)
-
(2008)
Computacion y Sistemas
, vol.12
, Issue.1
, pp. 89-108
-
-
Juan Carlos, L.P.1
Monroy, R.2
-
3
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18-36 (1990)
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Gong, L., Needham, R., Yahalom, R.: Reasoning about belief in cryptographic protocols. In: IEEE Symposium on Security and Privacy, p. 234 (1990)
-
(1990)
IEEE Symposium on Security and Privacy
, pp. 234
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
6
-
-
77957576551
-
Overview of security protocol analysis
-
Chen, Q., Zhang, C., Zhang, S. (eds.) Springer, Heidelberg
-
Chen, Q., Zhang, C., Zhang, S.: Overview of security protocol analysis. In: Chen, Q., Zhang, C., Zhang, S. (eds.) Secure Transaction Protocol Analysis. LNCS, vol. 5111, pp. 17-72. Springer, Heidelberg (2008)
-
(2008)
Secure Transaction Protocol Analysis. LNCS
, vol.5111
, pp. 17-72
-
-
Chen, Q.1
Zhang, C.2
Zhang, S.3
-
8
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
Lowe, G.: An attack on the needham-schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131-133 (1995)
-
(1995)
Inf. Process. Lett.
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
9
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe, G.: Casper: A compiler for the analysis of security protocols. Journal of Computer Security, 53-84 (1998)
-
(1998)
Journal of Computer Security
, pp. 53-84
-
-
Lowe, G.1
-
10
-
-
19744367735
-
Ofmc: A symbolic model checker for security protocols
-
Basin, D.A., Mödersheim, S., Viganò, L.: Ofmc: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3), 181-208 (2005)
-
(2005)
Int. J. Inf. Sec.
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.A.1
Mödersheim, S.2
Viganò, L.3
-
12
-
-
22944445210
-
SATMC: A SAT-based model checker for security protocols
-
Logics in Artificial Intelligence - 9th European Conference, JELIA 2004
-
Armando, A., Compagna, L.: Satmc: A sat-based model checker for security protocols. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS (LNAI), vol. 3229, pp. 730-733. Springer, Heidelberg (2004) (Pubitemid 41049985)
-
(2004)
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
, vol.3229
, pp. 730-733
-
-
Armando, A.1
Compagna, L.2
-
13
-
-
23144466756
-
Improvements on the genet and klay technique to automatically verify security protocols
-
Boichut, Y., Heam, P.C., Kouchnarenko, O., Oehl, F.: Improvements on the Genet and Klay Technique to Automatically Verify Security Protocols. In: Proc. Int. Workshop on Automated Verification of Infinite-State Systems (AVIS 2004), joint to ETAPS 2004, pp. 1-11 (2004)
-
(2004)
Proc. Int. Workshop on Automated Verification of Infinite-State Systems (AVIS 2004), Joint to ETAPS 2004
, pp. 1-11
-
-
Boichut, Y.1
Heam, P.C.2
Kouchnarenko, O.3
Oehl, F.4
-
14
-
-
33646227667
-
Automated security protocol analysis with the avispa tool
-
Vigan, L.: Automated security protocol analysis with the avispa tool. Electronic Notes in Theoretical Computer Science 155, 61-86 (2006)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.155
, pp. 61-86
-
-
Vigan, L.1
-
16
-
-
35248837934
-
Hermes: An automatic tool for verification of secrecy in security protocols
-
Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003, Springer, Heidelberg
-
Bozga, L., Lakhnech, Y., Périn, M.: Hermes: An automatic tool for verification of secrecy in security protocols. In: Hunt Jr., W.A., Somenzi, F. (eds.) CAV 2003. LNCS, vol. 2725, pp. 219-222. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2725
, pp. 219-222
-
-
Bozga, L.1
Lakhnech, Y.2
Périn, M.3
-
19
-
-
0023295108
-
The interrogator: Protocol secuity analysis
-
Millen, J.K., Clark, S.C., Freeman, S.B.: The interrogator: Protocol secuity analysis. IEEE Trans. Softw. Eng. 13(2), 274-288 (1987)
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freeman, S.B.3
-
20
-
-
77957550273
-
-
Tarigan, A., Rechnernetze, A., Systeme, V., Bielefeld, U.: Survey in formal analysis of security properties of cryptographic protocol (2002)
-
(2002)
Survey in Formal Analysis of Security Properties of Cryptographic Protocol
-
-
Tarigan, A.1
Rechnernetze, A.2
Systeme, V.3
Bielefeld, U.4
-
21
-
-
0030084918
-
The nrl protocol analyzer: An overview
-
Meadows, C.: The nrl protocol analyzer: An overview. The Journal of Logic Programming 26(2), 113-131 (1996)
-
(1996)
The Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
22
-
-
0039334690
-
Verifying security protocols with brutus
-
Clarke, E.M., Jha, S., Marrero, W.R.: Verifying security protocols with brutus. ACM Trans. Softw. Eng. Methodol. 9(4), 443-487 (2000)
-
(2000)
ACM Trans. Softw. Eng. Methodol.
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.R.3
-
23
-
-
0030705405
-
Automated analysis of cryptographic protocols using mur
-
Mitchell, J.C., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using mur. In: SP 1997: Proceedings of the 1997 IEEE Symposium on Security and Privacy, p. 141 (1997)
-
(1997)
SP 1997: Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 141
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
26
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
Song, D., Berezin, S., Perrig, A.: Athena: a novel approach to efficient automatic security protocol analysis. Journal of Computer Security 9, 2001 (2001)
-
(2001)
Journal of Computer Security 9, 2001
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
27
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
Thayer Fbrega, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Why is a security protocol correct? In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 160-171 (1998)
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Thayer Fbrega, F.J.1
Herzog, J.C.2
Guttman, J.D.3
|