-
2
-
-
38349029320
-
-
Intrusion attack tactics for the model checking of e-commerce security guarantees. In Proceedings of the 26th International Conference on Computer Safety, Reliability and Security (SAFECOMP), Nuremberg, Germany, LNCS 4680, Springer Verlag, -.
-
Basagiannis S, Katsaros P, Pombortsis A. Intrusion attack tactics for the model checking of e-commerce security guarantees. In Proceedings of the 26th International Conference on Computer Safety, Reliability and Security (SAFECOMP), Nuremberg, Germany, LNCS 4680, Springer Verlag, 2007; 238-251
-
(2007)
, pp. 238-251
-
-
Basagiannis, S.1
Katsaros, P.2
Pombortsis, A.3
-
3
-
-
84947611601
-
-
The Spin Model Checker: Primer and Reference Manual Addison-Wesley, ISBN 0-321-22862-6.
-
The Spin Model Checker: Primer and Reference Manual Addison-Wesley, ISBN 0-321-22862-6.
-
-
-
-
4
-
-
84947618949
-
-
The SPIN model checker official website, available at (last accessed 12/12/2008).
-
The SPIN model checker official website, available at (last accessed 12/12/2008).
-
-
-
-
5
-
-
0027701529
-
A methodology for improving computer access security
-
Obaidat MS. A methodology for improving computer access security. Computers & Security 1993; 12: 657-662.
-
(1993)
Computers & Security
, vol.12
, pp. 657-662
-
-
Obaidat, M.S.1
-
6
-
-
0003988659
-
The Theory and Practice of Concurrency
-
Prentice Hall: Upper Saddle River NJ, USA.
-
Roscoe AW. The Theory and Practice of Concurrency. Prentice Hall: Upper Saddle River NJ, USA, 1998.
-
(1998)
-
-
Roscoe, A.W.1
-
7
-
-
79251583622
-
A design of optimal key management scheme for secure and survivable wireless sensor networks
-
Yi Qian, Kejie Lu, Bo Rong, Tipper D. A design of optimal key management scheme for secure and survivable wireless sensor networks. Security and Communication Networks 2008; 1(1): 75-82.
-
(2008)
Security and Communication Networks
, vol.1
, Issue.1
, pp. 75-82
-
-
Yi, Q.1
Kejie, L.2
Bo, R.3
Tipper, D.4
-
8
-
-
0036836682
-
An intensive survey of fair non-repudiation protocols
-
Kremer S, Markowitch O, Zhou J. An intensive survey of fair non-repudiation protocols. Computer Communications 2002; 25(17): 1606-1621.
-
(2002)
Computer Communications
, vol.25
, Issue.17
, pp. 1606-1621
-
-
Kremer, S.1
Markowitch, O.2
Zhou, J.3
-
9
-
-
0003406298
-
Design and Validation of Computer Protocols
-
Prentice-Hall: Upper Saddle River, NJ, USA.
-
Holzmann GJ. Design and Validation of Computer Protocols. Prentice-Hall: Upper Saddle River, NJ, USA, 1991.
-
(1991)
-
-
Holzmann, G.J.1
-
10
-
-
26644436729
-
Computer and network security risk management: theory, challenges, and countermeasures
-
Hamdi M, Boudriga N. Computer and network security risk management: theory, challenges, and countermeasures. International Journal of Communication Systems 2005; 18(8): 763-793.
-
(2005)
International Journal of Communication Systems
, vol.18
, Issue.8
, pp. 763-793
-
-
Hamdi, M.1
Boudriga, N.2
-
11
-
-
84955602379
-
-
Formal verification of cryptographic protocols: a survey. Advances in Cryptology-International Conference on the Theory and Application of Cryptology (ASIACRYPT), LNCS 917, Springer-Verlag.
-
Meadows CA. Formal verification of cryptographic protocols: a survey. Advances in Cryptology-International Conference on the Theory and Application of Cryptology (ASIACRYPT), LNCS 917, Springer-Verlag, 1995; 133-150.
-
(1995)
, pp. 133-150
-
-
Meadows, C.A.1
-
12
-
-
33750936222
-
-
Feasibility of multi-protocol attacks. In Proceedings of the First International Conference on Availability, Reliability and Security, IEEE Computer Society Press.
-
Cremers CJF. Feasibility of multi-protocol attacks. In Proceedings of the First International Conference on Availability, Reliability and Security, IEEE Computer Society Press, 2006.
-
(2006)
-
-
Cremers, C.J.F.1
-
13
-
-
51949118177
-
-
A probabilistic attacker model for quantitative verification of DoS security threats. In Proceedings of the 32nd Annual International Computer and Applications Software (COMPSAC), Turku, Finland.
-
Basagiannis S, Katsaros P, Pombortsis A, Alexiou N. A probabilistic attacker model for quantitative verification of DoS security threats. In Proceedings of the 32nd Annual International Computer and Applications Software (COMPSAC), Turku, Finland, 2008.
-
(2008)
-
-
Basagiannis, S.1
Katsaros, P.2
Pombortsis, A.3
Alexiou, N.4
-
14
-
-
79251552463
-
-
Host Identity Protocol. Internet Engineering Task Force, RFC5201.
-
Moskowitz R, Nikander P, Jokela P, Henderson T. Host Identity Protocol. Internet Engineering Task Force, 2008; RFC5201.
-
(2008)
-
-
Moskowitz, R.1
Nikander, P.2
Jokela, P.3
Henderson, T.4
-
15
-
-
84979076059
-
-
Payword and Micromint: two simple micropayment schemes. In Proceedings of the Fourth International Workshop on Security Protocols, LNCS 1189, Springer-Verlag, -
-
Rivest RL, Shamir A. Payword and Micromint: two simple micropayment schemes. In Proceedings of the Fourth International Workshop on Security Protocols, LNCS 1189, Springer-Verlag, 1996; 69-87.
-
(1996)
, pp. 69-87
-
-
Rivest, R.L.1
Shamir, A.2
-
18
-
-
0030705405
-
-
Automated analysis of cryptographic protocols using Murφ, In Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society, -
-
Mitchell JC, Mitchell M, Stern U. Automated analysis of cryptographic protocols using Murφ, In Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society, 1997; 141-153.
-
(1997)
, pp. 141-153
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
19
-
-
0029484376
-
-
Modeling and verifying key-exchange protocols using CSP and FDR, In Proceedings of the 8th IEEE Computer Security Foundations Workshop, IEEE Computer Society, -
-
Roscoe AW. Modeling and verifying key-exchange protocols using CSP and FDR, In Proceedings of the 8th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 1995; 98-107.
-
(1995)
, pp. 98-107
-
-
Roscoe, A.W.1
-
20
-
-
0027205880
-
-
A semantic model for authentication protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy.
-
Woo TYC, Lam SS. A semantic model for authentication protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, 1993.
-
(1993)
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
21
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
Shmatikov V, Mitchell JC. Finite-state analysis of two contract signing protocols. Theoretical Computer Science 2002; 283: 419-450.
-
(2002)
Theoretical Computer Science
, vol.283
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
-
23
-
-
0025405980
-
A critique of the Burrows, Abadi and Needham logic
-
Nessett Dan M. A critique of the Burrows, Abadi and Needham logic. ACMSIGOPS Operating Systems Review 1990; 24(2): 35-38.
-
(1990)
ACMSIGOPS Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
25
-
-
0030678388
-
-
Casper: a compiler for the analysis of security protocols. In Proceedings of the IEEE Computer Security Foundations Workshop, IEEE Computer Society, -
-
Lowe G. Casper: a compiler for the analysis of security protocols. In Proceedings of the IEEE Computer Security Foundations Workshop, IEEE Computer Society, 1997; 18-30.
-
(1997)
, pp. 18-30
-
-
Lowe, G.1
-
26
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Meadows C, Kemmerer R, Millen J. Three systems for cryptographic protocol analysis. Journal of Cryptology 1994; 7(2): 79-130.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Meadows, C.1
Kemmerer, R.2
Millen, J.3
-
27
-
-
0032623470
-
Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification
-
Gritzalis S, Spinellis D, Georgiadis P. Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. Computer Communications 1999; 22: 697-709.
-
(1999)
Computer Communications
, vol.22
, pp. 697-709
-
-
Gritzalis, S.1
Spinellis, D.2
Georgiadis, P.3
-
28
-
-
79251563337
-
-
AVISPA: automated validation of Internet security protocols and applications, FET Open Project IST-2001-3925 2.
-
AVISPA: automated validation of Internet security protocols and applications, 2003. FET Open Project IST-2001-3925 2
-
(2003)
-
-
-
29
-
-
34547372939
-
-
An intruder model for verifying liveness in security protocols. In Proceedings of the fourth ACM workshop on Formal Methods in Security (FMSE '06), Alexandria, Virginia, USA, -.
-
Cederquist JG, Dashti MT. An intruder model for verifying liveness in security protocols. In Proceedings of the fourth ACM workshop on Formal Methods in Security (FMSE '06), Alexandria, Virginia, USA, 2006; 23-32
-
(2006)
, pp. 23-32
-
-
Cederquist, J.G.1
Dashti, M.T.2
-
30
-
-
0031634547
-
-
Towards a completeness result for model-checking of Security Protocols, In Proceedings of the 11th Computer Security Foundations Workshop. IEEE Computer Society Press.
-
Lowe G. Towards a completeness result for model-checking of Security Protocols, In Proceedings of the 11th Computer Security Foundations Workshop. IEEE Computer Society Press, 1998.
-
(1998)
-
-
Lowe, G.1
-
31
-
-
79251590434
-
-
The perfect spy for model-checking cryptoprotocols, In Proceedings of the Workshop on Design and Formal Verification of Security Protocols (DIMACS).
-
Roscoe AW, Goldsmith M. The perfect spy for model-checking cryptoprotocols, In Proceedings of the Workshop on Design and Formal Verification of Security Protocols (DIMACS), 1997.
-
(1997)
-
-
Roscoe, A.W.1
Goldsmith, M.2
-
32
-
-
79251554258
-
-
A survey of authentication protocol literature: version 1.0, Technical Report, University of York.
-
Clark J, Jacob J. A survey of authentication protocol literature: version 1.0, Technical Report, University of York, 1997.
-
(1997)
-
-
Clark, J.1
Jacob, J.2
-
33
-
-
0033683193
-
-
How to prevent type flaw attacks on security protocols, In Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society, -
-
Heather J, Lowe G, Schneider S. How to prevent type flaw attacks on security protocols, In Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 2000; 255-268.
-
(2000)
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
34
-
-
85063324360
-
-
Cryptographic protocol flaws-Know your enemy, In Proceedings of the 7th IEEE Computer Security Foundations Workshop, IEEE Computer Society, -
-
Carlsen U. Cryptographic protocol flaws-Know your enemy, In Proceedings of the 7th IEEE Computer Security Foundations Workshop, IEEE Computer Society, 1994; 192-200.
-
(1994)
, pp. 192-200
-
-
Carlsen, U.1
-
35
-
-
84962060059
-
-
The logic of authentication protocols. In Proceedings of the 1st International School on Foundations of Security Analysis and Design (FOSAD 2000) LNCS 2171, Springer-Verlag, 2001.
-
Syverson P, Cervesato I. The logic of authentication protocols. In Proceedings of the 1st International School on Foundations of Security Analysis and Design (FOSAD 2000) LNCS 2171, Springer-Verlag, 2001, 63-137.
-
-
-
Syverson, P.1
Cervesato, I.2
-
36
-
-
79251563650
-
Using selective, short-term memory to improve resilience against DDoS exhaustion attacks
-
Liao Q, Cieslak DA, Striegel AD, Chawla NV. Using selective, short-term memory to improve resilience against DDoS exhaustion attacks. Security and Communication Networks. 2008; 1(4): 287-299.
-
(2008)
Security and Communication Networks.
, vol.1
, Issue.4
, pp. 287-299
-
-
Liao, Q.1
Cieslak, D.A.2
Striegel, A.D.3
Chawla, N.V.4
-
37
-
-
79251578206
-
-
The MD5 Message-Digest Algorithm, Internet informational RFC 1321.
-
Rivest RL. The MD5 Message-Digest Algorithm, Internet informational RFC 1321, 1992.
-
(1992)
-
-
Rivest, R.L.1
|