-
1
-
-
0342658605
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems
-
G. Lowe, "Breaking and fixing the Needham-Schroeder public-key protocol using FDR, " in Tools and Algorithms for the Construction and Analysis of Systems (TACAS'96), ser. LNCS, vol. 1055. Springer-Verlag, 1996, pp. 147-166. (Pubitemid 126050413)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1055
, pp. 147-166
-
-
Lowe, G.1
-
2
-
-
70349233792
-
Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps
-
A. Armando, R. Carbone, L. Compagna, J. Cuellar, and L. T. Abad, "Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps, " in 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), 2008, pp. 1-10.
-
(2008)
6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008)
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Abad, L.T.5
-
3
-
-
26444497860
-
The AVISPA Tool for the automated validation of internet security protocols and applications
-
ser. Lecture Notes in Computer Science, Springer
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Vigaǹo, and L. Vigneron, "The AVISPA Tool for the automated validation of internet security protocols and applications, " in 17th International Conference on Computer Aided Verification, CAV'2005, ser. Lecture Notes in Computer Science, vol. 3576. Springer, 2005, pp. 281-285.
-
(2005)
17th International Conference on Computer Aided Verification, CAV'2005
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Héam, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Oheimb, D.V.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigaǹo, L.16
Vigneron, L.17
-
4
-
-
24344493908
-
Computer-Assisted Verification of a Protocol for Certified Email
-
Oct., special issue SAS'03
-
M. Abadi and B. Blanchet, "Computer-Assisted Verification of a Protocol for Certified Email, " Science of Computer Programming, vol. 58, no. 1-2, pp. 3-27, Oct. 2005, special issue SAS'03.
-
(2005)
Science of Computer Programming
, vol.58
, Issue.1-2
, pp. 3-27
-
-
Abadi, M.1
Blanchet, B.2
-
5
-
-
35048861871
-
Just fast keying in the Pi calculus
-
ser. Lecture Notes on Computer Science, Springer Verlag, Mar.
-
M. Abadi, B. Blanchet, and C. Fournet, "Just Fast Keying in the Pi Calculus, " in 13th European Symposium on Programming (ESOP'04), ser. Lecture Notes on Computer Science, vol. 2986. Springer Verlag, Mar. 2004, pp. 340-354.
-
(2004)
13th European Symposium on Programming (ESOP'04)
, vol.2986
, pp. 340-354
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
6
-
-
0042500424
-
Undecidability of bounded security protocols
-
N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov, "Undecidability of bounded security protocols, " in Workshop on Formal Methods and Security, 1999.
-
(1999)
Workshop on Formal Methods and Security
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
7
-
-
0037453396
-
Protocol insecurity with finite number of sessions and composed keys is NP-complete
-
M. Rusinowitch and M. Turuani, "Protocol insecurity with finite number of sessions and composed keys is NP-complete, " Theoretical Computer Science, vol. 299, pp. 451-475, 2003.
-
(2003)
Theoretical Computer Science
, vol.299
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
-
8
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society Press, June
-
B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules, " in 14th Computer Security Foundations Workshop (CSFW'01). IEEE Computer Society Press, June 2001.
-
(2001)
14th Computer Security Foundations Workshop (CSFW'01)
-
-
Blanchet, B.1
-
9
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
IEEE Computer Society Press
-
G. Lowe, "Casper: A compiler for the analysis of security protocols, " in 10th Computer Security Foundations Workshop (CSFW'97). IEEE Computer Society Press, 1997.
-
(1997)
10th Computer Security Foundations Workshop (CSFW'97)
-
-
Lowe, G.1
-
10
-
-
77957125845
-
An automatic security protocol verifier based on resolution theorem proving (invited tutorial)
-
July
-
B. Blanchet, "An automatic security protocol verifier based on resolution theorem proving (invited tutorial), " in 20th International Conference on Automated Deduction (CADE- 20), July 2005.
-
(2005)
20th International Conference on Automated Deduction (CADE- 20)
-
-
Blanchet, B.1
-
11
-
-
50249164303
-
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
-
M. Backes, M. Maffei, and D. Unruh, "Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol, " in IEEE Symposium on Security and Privacy, 2008, pp. 202-215.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 202-215
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
12
-
-
68249084846
-
Verifying privacytype properties of electronic voting protocols
-
Jul.
-
S. Delaune, S. Kremer, and M. D. Ryan, "Verifying privacytype properties of electronic voting protocols, " Journal of Computer Security, vol. 17, no. 4, pp. 435-487, Jul. 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 435-487
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
13
-
-
77957559352
-
Protocol composition for arbitrary primitives
-
ENS Cachan, France, Apr.
-
Ş . Ciobâcǎ and V. Cortier, "Protocol composition for arbitrary primitives, " Laboratoire Spécification et Vérification, ENS Cachan, France, Research Report LSV-10-09, Apr. 2010.
-
(2010)
Laboratoire Spécification et Vérification, Research Report LSV-10-09
-
-
Ciobâcǎ, Ş.1
Cortier, V.2
-
14
-
-
17644411480
-
Mobile values, new names, and secure communication
-
January
-
M. Abadi and C. Fournet, "Mobile values, new names, and secure communication, " in 28th ACM Symposium on Principles of Programming Languages (POPL'01), January 2001, pp. 104-115.
-
(2001)
28th ACM Symposium on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
17
-
-
38349000750
-
Safely composing security protocols
-
ser. Lecture Notes in Computer Science, Springer, Dec.
-
V. Cortier, J. Delaitre, and S. Delaune, "Safely composing security protocols, " in 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), ser. Lecture Notes in Computer Science, vol. 4855. Springer, Dec. 2007, pp. 352-363.
-
(2007)
27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07)
, vol.4855
, pp. 352-363
-
-
Cortier, V.1
Delaitre, J.2
Delaune, S.3
-
21
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F. J. T. Fábrega, "Strand spaces: proving security protocols correct, " J. Comput. Secur., vol. 7, no. 2-3, pp. 191-230, 1999.
-
(1999)
J. Comput. Secur.
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Fábrega, F.J.T.1
-
22
-
-
70349303077
-
Cryptographic protocol composition via the authentication tests
-
ser. Lecture Notes in Computer Science, March
-
J. D. Guttman, "Cryptographic protocol composition via the authentication tests, " in Foundations of Software Science and Computation Structures (FOSSACS'09), ser. Lecture Notes in Computer Science, March 2009.
-
(2009)
Foundations of Software Science and Computation Structures (FOSSACS'09)
-
-
Guttman, J.D.1
-
23
-
-
51749097358
-
Composition of password-based protocols
-
IEEE Computer Society Press, Jun.
-
S. Delaune, S. Kremer, and M. D. Ryan, "Composition of password-based protocols, " in 21st IEEE Computer Security Foundations Symposium (CSF'08). IEEE Computer Society Press, Jun. 2008, pp. 239-251.
-
(2008)
21st IEEE Computer Security Foundations Symposium (CSF'08)
, pp. 239-251
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
24
-
-
70350399645
-
Secure pseudonymous channels
-
ser. Lecture Notes in Computer Science, Springer
-
S. Mödersheim and L. Viganò, "Secure pseudonymous channels, " in 14th European Symposium On Research In Computer Security (ESORICS'09), ser. Lecture Notes in Computer Science, vol. 5789. Springer, 2009, pp. 337-354.
-
(2009)
14th European Symposium on Research in Computer Security (ESORICS'09)
, vol.5789
, pp. 337-354
-
-
Mödersheim, S.1
Viganó, L.2
-
25
-
-
79251539011
-
Simulation based security in the applied pi calculus
-
ser. Leibniz International Proceedings in Informatics, Leibniz-Zentrum f̈ur Informatik, Dec
-
S. Delaune, S. Kremer, and O. Pereira, "Simulation based security in the applied pi calculus, " in 29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09), ser. Leibniz International Proceedings in Informatics, vol. 4. Leibniz-Zentrum f̈ur Informatik, Dec. 2009, pp. 169-180.
-
(2009)
29th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'09)
, vol.4
, pp. 169-180
-
-
Delaune, S.1
Kremer, S.2
Pereira, O.3
-
26
-
-
33847655213
-
Protocol composition logic (PCL)
-
A. Datta, A. Derek, J. C. Mitchell, and A. Roy, "Protocol composition logic (PCL), " Electron. Notes Theor. Comput. Sci., vol. 172, pp. 311-358, 2007.
-
(2007)
Electron. Notes Theor. Comput. Sci.
, vol.172
, pp. 311-358
-
-
Datta, A.1
Derek, A.2
Mitchell, J.C.3
Roy, A.4
-
27
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
R. Canetti, "Universally composable security: A new paradigm for cryptographic protocols, " in IEEE Symposium on Foundations of Computer Science, 2001, pp. 136-145.
-
(2001)
IEEE Symposium on Foundations of Computer Science
, pp. 136-145
-
-
Canetti, R.1
-
28
-
-
35248819315
-
Universal composition with joint state
-
R. Canetti and T. Rabin, "Universal composition with joint state, " in CRYPTO, 2003, pp. 265-281.
-
(2003)
CRYPTO
, pp. 265-281
-
-
Canetti, R.1
Rabin, T.2
|