-
1
-
-
85031620050
-
A semantics for a logic of authentication
-
ACM Press, New York, NY, USA
-
Abadi M., Tuttle M., "A semantics for a logic of authentication", Proceedings of the 10th annual ACM symposium on Principles of distributed computing (PODC?91), ACM Press, New York, NY, USA, pp. 201-216, 1991
-
(1991)
Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing (PODC?91
, pp. 201-216
-
-
Abadi, M.1
Tuttle, M.2
-
2
-
-
26444497860
-
The AVISPA Tool for the automated validation of internet security protocols and applications
-
Edinburgh, UK 07 AVISPA-project, "AVISS - Deliverable D.6.1: List of selected problems 2005
-
Armando A., Basin D., Boichut Y., Chevalier Y., Compagna L., Cuellar J., Drielsma P., Héam P., Mantovani J., Moedersheim S., Oheimb D. v., Rusinowitch M., Santiago J., Turuani M., Viganò L., Vigneron L., "The AVISPA Tool for the automated validation of internet security protocols and applications", Proceedings of the 17th International Conference on Computer Aided Verification (CAV?05), vol. 3576 of Lecture Notes in Computer Science, Edinburgh, UK, pp. 281-285, 07, 2005. AVISPA-project, "AVISS - Deliverable D.6.1: List of selected problems", http://www. avispa-project.org/delivs/6.1/d6-1.ps, 2005
-
(2005)
Proceedings of the 17th International Conference on Computer Aided Verification (CAV?05) 3576 of Lecture Notes in Computer Science
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.7
Héam, P.8
Mantovani, J.9
Moedersheim, S.10
Oheimb, D.V.11
Rusinowitch, M.12
Santiago, J.13
Turuani, M.14
Viganò, L.15
Vigneron, L.16
-
3
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
June
-
Basin D., Mödersheim S., Viganò L., "OFMC: A symbolic model checker for security protocols", International Journal of Information Security, vol. 4, num. 3, pp. 181-208, June, 2005
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
5
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
Springer
-
Boreale M., "Symbolic trace analysis of cryptographic protocols", Proceedings of the 28th International Colloquium of Automata, Languages and Programming (ICALP?01), vol. 2076 of Lecture Notes in Computer Science, Springer, pp. 667-681, 2001
-
(2001)
Proceedings of the 28th International Colloquium of Automata, Languages and Programming (ICALP?01) 2076 of Lecture Notes in Computer Science
, pp. 667-681
-
-
Boreale, M.1
-
7
-
-
0004215976
-
-
Technical report, DEC-SRC
-
Burrows M., Abadi M., Needham R., A Logic of Authentication, Technical report, DEC-SRC, http://www.hpl.hp.com/techreports/Compaq-DEC/SRC-RR-39.html, 1990
-
(1990)
A Logic of Authentication
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum D., "The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability", Journal of Cryptology, vol. 1, num. 1, pp. 65-75, 1988
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
13
-
-
33751024861
-
A logic for constraint-based security protocol analysis
-
IEEE Computer Society, Washington, DC, USA
-
Corin R., Etalle S., Saptawijaya A., "A Logic for Constraint-based Security Protocol Analysis", Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P?06), IEEE Computer Society, Washington, DC, USA, pp. 155-168, 2006
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P?06)
, pp. 155-168
-
-
Corin, R.1
Etalle, S.2
Saptawijaya, A.3
-
15
-
-
0020720357
-
On the security of public-key protocols
-
Dolev D., Yao A., "On the Security of Public-Key Protocols", IEEE Transactions on Information Theory, vol. 29, pp. 198-208, 1983
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
16
-
-
0003730235
-
-
MIT Press, Cambridge
-
Fagin R., Halpern J., Moses Y., Vardi M., Reasoning about Knowledge, MIT Press, Cambridge, 1995
-
(1995)
Reasoning about Knowledge
-
-
Fagin, R.1
Halpern, J.2
Moses, Y.3
Vardi, M.4
-
17
-
-
35248868917
-
Modeling adversaries in a logic for security protocol analysis
-
Springer
-
Halpern J., Pucella R., "Modeling Adversaries in a Logic for Security Protocol Analysis", Proceedings of the Workshop on Formal Aspects of Security (FASec?02), vol. 2629 of Lecture Notes in Computer Science, Springer, pp. 115-132, 2002
-
(2002)
Proceedings of the Workshop on Formal Aspects of Security (FASec?02) of Lecture Notes in Computer Science
, vol.2629
, pp. 115-132
-
-
Halpern, J.1
Pucella, R.2
-
18
-
-
0141528667
-
A logical reconstruction of SPKI
-
Halpern J. Y., Meyden R., "A logical reconstruction of SPKI", Journal of Computer Security, vol. 11, num. 4, pp. 581-613, 2004
-
(2004)
Journal of Computer Security
, vol.11
, Issue.4
, pp. 581-613
-
-
Halpern, J.Y.1
Meyden, R.2
-
19
-
-
0037268614
-
How to prevent type flaw attacks on security protocols
-
Heather J., Lowe G., Schneider S., "How to Prevent Type Flaw Attacks on Security Protocols", Journal of Computer Security, vol. 11, num. 2, pp. 217-244, 2003
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 217-244
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
20
-
-
33747048946
-
Comparing BDD and SAT based techniques for model checking chaums dining cryptographers protocol
-
Kacprzak M., Lomuscio A., Niewiadomski A., PenczekW., Raimondi F., Szreter M., "Comparing BDD and SAT based techniques for model checking Chaum?s Dining Cryptographers Protocol", Fundamenta Informaticae, vol. 72, num. 1-3, pp. 215-234, 2006
-
(2006)
Fundamenta Informaticae
, vol.72
, Issue.1-3
, pp. 215-234
-
-
Kacprzak, M.1
Lomuscio, A.2
Penczekw, N.A.3
Raimondi, F.4
Szreter, M.5
-
21
-
-
77956512631
-
VerICS 2007 - A model checker for knowledge and real-time
-
Kacprzak M., Nabialek W., Niewiadomski A., Penczek W., Pólrola A., Szreter M., Wózna B., Zbrzezny A., "VerICS 2007 - a Model Checker for Knowledge and Real-Time", Fundamenta Informaticae, vol. 85, num. 1-4, pp. 313-328, 2008
-
(2008)
Fundamenta Informaticae
, vol.85
, Issue.1-4
, pp. 313-328
-
-
Kacprzak, M.1
Nabialek, W.2
Niewiadomski, A.3
Penczek, W.4
Pólrola, A.5
Szreter, M.6
Wózna, B.7
Zbrzezny, A.8
-
22
-
-
0002494222
-
A nonce-based protocol for multiple authentications
-
Kehne A., Schönwälder J., Langendörfer H., "A nonce-based protocol for multiple authentications", SIGOPS Operating Systems Review, vol. 26, num. 4, pp. 84-89, 1992
-
(1992)
SIGOPS Operating Systems Review
, vol.26
, Issue.4
, pp. 84-89
-
-
Kehne, A.1
Schönwälder, J.2
Langendörfer, H.3
-
23
-
-
84887430467
-
-
Laboratoire Spécification et Vérification ENS Cachan, SPORE: Security Protocols Open Repository
-
Laboratoire Spécification et Vérification ENS Cachan, "SPORE: Security Protocols Open Repository", http://www.lsv.ens- cachan.fr/spore/index.html, 2003
-
(2003)
-
-
-
24
-
-
67650450119
-
LDYIS: A framework for model checking security protocols
-
Lomuscio A., Penczek W., "LDYIS: a framework for model checking security protocols", Fundamenta Informaticae, vol. 85, pp. 359-375, 2008
-
(2008)
Fundamenta Informaticae
, vol.85
, pp. 359-375
-
-
Lomuscio, A.1
Penczek, W.2
-
25
-
-
70350243070
-
MCMAS: A model checker for multi-agent systems
-
Springer
-
Lomuscio A., Qu H., Raimondi F., "MCMAS: A model checker for multi-agent systems", Proceedings of the 21st International Conference on Computer Aided Verification (CAV?09), vol. 5643 of Lecture Notes in Computer Science, Springer, pp. 682-688, 2009
-
(2009)
Proceedings of the 21st International Conference on Computer Aided Verification (CAV?09) of Lecture Notes in Computer Science
, vol.5643
, pp. 682-688
-
-
Lomuscio, A.1
Qu, H.2
Raimondi, F.3
-
26
-
-
34548656983
-
Verification of the Tesla protocol in MCMAS-X
-
july
-
Lomuscio A., Raimondi F., Wozna B., "Verification of the Tesla protocol in MCMAS-X", Fundamenta Informaticae, vol. 79, num. 3-4, pp. 473-486, july, 2007
-
(2007)
Fundamenta Informaticae
, vol.79
, Issue.3-4
, pp. 473-486
-
-
Lomuscio, A.1
Raimondi, F.2
Wozna, B.3
-
28
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe G., "Casper: A Compiler for the Analysis of Security Protocols", Journal of Computer Security, vol. 6, num. 1-2, pp. 53-84, 1998
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 53-84
-
-
Lowe, G.1
-
29
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows C., "The NRL Protocol Analyzer: An Overview", Journal of Logic Programming, vol. 26, pp. 113-131, 1996
-
(1996)
Journal of Logic Programming
, vol.26
, pp. 113-131
-
-
Meadows, C.1
-
30
-
-
33747046805
-
MCK: Model checking the logic of knowledge
-
Springer
-
Meyden R., Gammie P., "MCK: Model Checking the Logic of Knowledge", Proceedings of 16th International Conference on Computer Aided Verification (CAV?04), vol. 3114 of Lecture Notes in Computer Science, Springer, pp. 479-483, 2004a
-
(2004)
Proceedings of 16th International Conference on Computer Aided Verification (CAV?04) of Lecture Notes in Computer Science
, vol.3114
, pp. 479-483
-
-
Meyden, R.1
Gammie, P.2
-
31
-
-
4944250729
-
Symbolic model checking the knowledge of the dining cryptographers
-
Washington, DC, USA
-
Meyden R., Su K., "Symbolic Model Checking the Knowledge of the Dining Cryptographers", Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW?04), IEEE Computer Society, Washington, DC, USA, pp. 280-291, 2004b
-
(2004)
Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW?04), IEEE Computer Society
, pp. 280-291
-
-
Meyden, R.1
Su, K.2
-
33
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., Schroeder M., "Using Encryption for Authentication in Large Networks of Computers", Communications of the ACM, vol. 21, pp. 993-999, 1978
-
(1978)
Communications of the ACM
, vol.21
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
35
-
-
85007180552
-
Distributed processes and the logic of knowledge
-
Parikh R., Ramanujam R., "Distributed Processes and the Logic of Knowledge", Logic of Programs, pp. 256-268, 1985
-
(1985)
Logic of Programs
, pp. 256-268
-
-
Parikh, R.1
Ramanujam, R.2
-
37
-
-
84948751138
-
A logic for reasoning about digital rights
-
Los Alamitos, CA, USA
-
Pucella R., Weissman V., "A Logic for Reasoning about Digital Rights", Proceedings of the 15th Computer Security Foundations Workshop (CSFW?02), IEEE Computer Society, Los Alamitos, CA, USA, pp. 282-294, 2002
-
(2002)
Proceedings of the 15th Computer Security Foundations Workshop (CSFW?02) IEEE Computer Society
, pp. 282-294
-
-
Pucella, R.1
Weissman, V.2
-
40
-
-
0034822801
-
Protocol insecurity with finite number of sessions is NPcomplete
-
Los Alamitos, CA, USA
-
Rusinowitch M., Turuani M., "Protocol Insecurity with Finite Number of Sessions is NPcomplete", Proceedings of the 14th IEEE Workshop on Computer Security Foundations (CSFW?01), IEEE Computer Society, Los Alamitos, CA, USA, pp. 174-187, 2001
-
(2001)
Proceedings of the 14th IEEE Workshop on Computer Security Foundations (CSFW?01) IEEE Computer Society
, pp. 174-187
-
-
Rusinowitch, M.1
Turuani, M.2
-
41
-
-
84962060059
-
The logic of authentication protocols
-
Springer
-
Syverson P., Cervesato I., "The Logic of Authentication Protocols", Proceedings of the International School on Foundations of Security Analysis and Design (FOSAD?00), vol. 2170 of Lecture Notes in Computer Science, Springer, pp. 63-136, 2000
-
(2000)
Proceedings of the International School on Foundations of Security Analysis and Design (FOSAD?00) of Lecture Notes in Computer Science
, vol.2170
, pp. 63-136
-
-
Syverson, P.1
Cervesato, I.2
-
42
-
-
84924758404
-
Group principals and the formalization of anonymity
-
Springer, London, UK
-
Syverson P., Stubblebine S., "Group Principals and the Formalization of Anonymity", Proceedings of the Wold Congress on Formal Methods (FM?99) in the Development of Computing Systems-Volume I, Springer, London, UK, pp. 814-833, 1999
-
(1999)
Proceedings of the Wold Congress on Formal Methods (FM?99) in the Development of Computing Systems
, vol.1
, pp. 814-833
-
-
Syverson, P.1
Stubblebine, S.2
|