-
1
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson, "The inductive approach to verifying cryptographic protocols, " Journal of Computer Security, vol. 6, pp. 85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
2
-
-
0003503018
-
-
ser. Lecture Notes in Computer Science. Springer
-
T. Nipkow, L. C. Paulson, and M. Wenzel, Isabelle/HOL - A Proof Assistant for Higher-Order Logic, ser. Lecture Notes in Computer Science. Springer, 2002, vol. 2283.
-
(2002)
Isabelle/HOL - A Proof Assistant for Higher-Order Logic
, vol.2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
3
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
L. C. Paulson, "Inductive analysis of the internet protocol TLS, " ACM Trans. Inf. Syst. Secur., vol. 2, no. 3, pp. 332- 351, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
4
-
-
22444455879
-
Kerberos version 4: Inductive analysis of the secrecy goals
-
ser. Lecture Notes in Computer Science, J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds., Springer
-
G. Bella and L. C. Paulson, "Kerberos version 4: Inductive analysis of the secrecy goals, " in ESORICS, ser. Lecture Notes in Computer Science, J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, Eds., vol. 1485. Springer, 1998, pp. 361-375.
-
(1998)
ESORICS
, vol.1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
5
-
-
33750247207
-
Verifying the SET purchase protocols
-
G. Bella, F. Massacci, and L. C. Paulson, "Verifying the SET purchase protocols, " J. Autom. Reasoning, vol. 36, pp. 5-37, 2006.
-
(2006)
J. Autom. Reasoning
, vol.36
, pp. 5-37
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
-
6
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. Song, S. Berezin, and A. Perrig, "Athena: A novel approach to efficient automatic security protocol analysis, " Journal of Computer Security, vol. 9, pp. 47-74, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
7
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
B. Blanchet, "Automatic verification of correspondences for security protocols, " Journal of Computer Security, vol. 17, no. 4, pp. 363-434, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
8
-
-
67650240831
-
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
-
New York, NY, USA: ACM
-
C. Cremers, "Unbounded verification, falsification, and characterization of security protocols by pattern refinement, " in CCS '08: Proceedings of the 15th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2008, pp. 119-128.
-
(2008)
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 119-128
-
-
Cremers, C.1
-
11
-
-
77957573129
-
Operational semantics of security protocols
-
ser. Lecture Notes in Computer Science, S. Leue and T. Systä, Eds., Springer
-
C. Cremers and S. Mauw, "Operational semantics of security protocols, " in Scenarios: Models, Transformations and Tools, International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers, ser. Lecture Notes in Computer Science, S. Leue and T. Systä, Eds., vol. 3466. Springer, 2005.
-
(2005)
Scenarios: Models, Transformations and Tools, International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers
, vol.3466
-
-
Cremers, C.1
Mauw, S.2
-
13
-
-
51749115322
-
Towards producing formally checkable security proofs, automatically
-
IEEE Computer Society
-
J. Goubault-Larrecq, "Towards producing formally checkable security proofs, automatically, " in CSF. IEEE Computer Society, 2008, pp. 224-238.
-
(2008)
CSF
, pp. 224-238
-
-
Goubault-Larrecq, J.1
-
15
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society
-
G. Lowe, "A hierarchy of authentication specifications, " in CSFW. IEEE Computer Society, 1997, pp. 31-44.
-
(1997)
CSFW
, pp. 31-44
-
-
Lowe, G.1
-
16
-
-
33750487822
-
Injective synchronisation: An extension of the authentication hierarchy
-
C. Cremers, S. Mauw, and E. de Vink, "Injective synchronisation: An extension of the authentication hierarchy, " Theor. Comput. Sci., vol. 367, pp. 139-161, 2006.
-
(2006)
Theor. Comput. Sci.
, vol.367
, pp. 139-161
-
-
Cremers, C.1
Mauw, S.2
Vink, E.D.3
-
18
-
-
0033683193
-
How to prevent type flaw attacks on security protocols
-
J. Heather, G. Lowe, and S. Schneider, "How to prevent type flaw attacks on security protocols, " in CSFW, 2000, pp. 255- 268.
-
(2000)
CSFW
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
19
-
-
12744277366
-
On preventing type flaw attacks on security protocols with a simplified tagging scheme
-
Y. Li, W. Yang, and C.-W. Huang, "On preventing type flaw attacks on security protocols with a simplified tagging scheme, " J. Inf. Sci. Eng., vol. 21, no. 1, pp. 59-84, 2005.
-
(2005)
J. Inf. Sci. Eng.
, vol.21
, Issue.1
, pp. 59-84
-
-
Li, Y.1
Yang, W.2
Huang, C.-W.3
-
20
-
-
38349010575
-
Bounding messages for free in security protocols
-
ser. Lecture Notes in Computer Science, V. Arvind and S. Prasad, Eds., Springer
-
M. Arapinis and M. Duflot, "Bounding messages for free in security protocols, " in FSTTCS, ser. Lecture Notes in Computer Science, V. Arvind and S. Prasad, Eds., vol. 4855. Springer, 2007, pp. 376-387.
-
(2007)
FSTTCS
, vol.4855
, pp. 376-387
-
-
Arapinis, M.1
Duflot, M.2
-
21
-
-
3042529055
-
Undecidability of bounded security protocols
-
Trento, Italy, N. Heintze and E. Clarke, Eds
-
N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov, "Undecidability of bounded security protocols, " in Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP, Trento, Italy, N. Heintze and E. Clarke, Eds., 1999.
-
(1999)
Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
22
-
-
57049134167
-
The Isabelle framework
-
ser. Lecture Notes in Computer Science, O. A. Mohamed, C. Muñoz, and S. Tahar, Eds., Springer
-
M. Wenzel, L. C. Paulson, and T. Nipkow, "The Isabelle framework, " in TPHOLs, ser. Lecture Notes in Computer Science, O. A. Mohamed, C. Muñoz, and S. Tahar, Eds., vol. 5170. Springer, 2008, pp. 33-38.
-
(2008)
TPHOLs
, vol.5170
, pp. 33-38
-
-
Wenzel, M.1
Paulson, L.C.2
Nipkow, T.3
-
24
-
-
0034950756
-
Relations between secrets: Two formal analyses of the Yahalom protocol
-
L. C. Paulson, "Relations between secrets: Two formal analyses of the Yahalom protocol, " Journal of Computer Security, vol. 9, no. 3, pp. 197-216, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 197-216
-
-
Paulson, L.C.1
-
26
-
-
15744388991
-
Tree automata with one memory set constraints and cryptographic protocols
-
H. Comon and V. Cortier, "Tree automata with one memory set constraints and cryptographic protocols, " Theor. Comput. Sci., vol. 331, no. 1, pp. 143-214, 2005.
-
(2005)
Theor. Comput. Sci.
, vol.331
, Issue.1
, pp. 143-214
-
-
Comon, H.1
Cortier, V.2
-
27
-
-
84874348708
-
An Isabelle formalization of protocolindependent secrecy with an application to e-commerce
-
vol. abs/cs/0610069
-
F. Blanqui, "An Isabelle formalization of protocolindependent secrecy with an application to e-commerce, " CoRR, vol. abs/cs/0610069, 2006.
-
(2006)
CoRR
-
-
Blanqui, F.1
-
28
-
-
20144370847
-
Verifying security protocols with PVS: Widening the rank function approach
-
N. Evans and S. A. Schneider, "Verifying security protocols with PVS: widening the rank function approach, " J. Log. Algebr. Program., vol. 64, no. 2, pp. 253-284, 2005.
-
(2005)
J. Log. Algebr. Program.
, vol.64
, Issue.2
, pp. 253-284
-
-
Evans, N.1
Schneider, S.A.2
-
29
-
-
0030684956
-
Verifying authentication protocols with CSP
-
S. Schneider, "Verifying authentication protocols with CSP, " in CSFW, 1997, pp. 3-17.
-
(1997)
CSFW
, pp. 3-17
-
-
Schneider, S.1
-
30
-
-
71749089654
-
Semantics and logic for security protocols
-
B. Jacobs and I. Hasuo, "Semantics and logic for security protocols, " J. Comput. Secur., no. 6, pp. 909-944, 2009.
-
(2009)
J. Comput. Secur.
, vol.6
, pp. 909-944
-
-
Jacobs, B.1
Hasuo, I.2
-
31
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F. J. Thayer, J. C. Herzog, and J. D. Guttman, "Strand spaces: Proving security protocols correct, " Journal of Computer Security, vol. 7, no. 1, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Thayer, F.J.1
Herzog, J.C.2
Guttman, J.D.3
-
32
-
-
3042563843
-
Authentication tests and disjoint encryption: A design method for security protocols
-
J. D. Guttman, "Authentication tests and disjoint encryption: A design method for security protocols, " Journal of Computer Security, vol. 12, pp. 409-433, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, pp. 409-433
-
-
Guttman, J.D.1
-
34
-
-
70349335930
-
The open-source fixed-point model checker for symbolic analysis of security protocols
-
ser. Lecture Notes in Computer Science, A. Aldini, G. Barthe, and R. Gorrieri, Eds., Springer
-
S. Mödersheim and L. Viganò, "The Open-source Fixed-point Model Checker for symbolic analysis of security protocols, " in FOSAD, ser. Lecture Notes in Computer Science, A. Aldini, G. Barthe, and R. Gorrieri, Eds., vol. 5705. Springer, 2009, pp. 166-194.
-
(2009)
FOSAD
, vol.5705
, pp. 166-194
-
-
Mödersheim, S.1
Viganó, L.2
-
36
-
-
77957596263
-
How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC
-
to appear
-
S. Matsuo, K. Miyazaki, A. Otsuka, and D. Basin, "How to evaluate the security of real-life cryptographic protocols? the cases of ISO/IEC 29128 and CRYPTREC, " in Financial Cryptography, 2010, to appear.
-
(2010)
Financial Cryptography
-
-
Matsuo, S.1
Miyazaki, K.2
Otsuka, A.3
Basin, D.4
-
37
-
-
35048899619
-
Searching for shapes in cryptographic protocols
-
ser. Lecture Notes in Computer Science, O. Grumberg and M. Huth, Eds., Springer
-
S. F. Doghmi, J. D. Guttman, and F. J. Thayer, "Searching for shapes in cryptographic protocols, " in TACAS, ser. Lecture Notes in Computer Science, O. Grumberg and M. Huth, Eds., vol. 4424. Springer, 2007, pp. 523-537.
-
(2007)
TACAS
, vol.4424
, pp. 523-537
-
-
Doghmi, S.F.1
Guttman, J.D.2
Thayer, F.J.3
|