-
1
-
-
0002885224
-
Prudent engineering practice for cryptographie protocols
-
M. Abadi and R. M. Needham, "Prudent engineering practice for cryptographic protocols," IEEE Trans. Software Eng., vol. 22, no. 1, pp. 6-15, 1996. (Pubitemid 126771654)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
3
-
-
79953220810
-
Verified software toolchain
-
ESOP, ser.
-
A. W. Appel, "Verified software toolchain," in ESOP, ser. LNCS, vol. 6602, 2011, pp. 1-17.
-
(2011)
LNCS
, vol.6602
, pp. 1-17
-
-
Appel, A.W.1
-
4
-
-
80052649937
-
Union and intersection types for secure protocol implementations
-
M. Backes, C. Hriţcu, and M. Maffei, "Union and intersection types for secure protocol implementations," in TOSCA, 2011.
-
(2011)
TOSCA
-
-
Backes, M.1
Hriţcu, C.2
Maffei, M.3
-
5
-
-
78650000256
-
Computationally sound verification of source code
-
M. Backes, M. Maffei, and D. Unruh, "Computationally sound verification of source code," in ACM CCS, 2010, pp. 387-398.
-
(2010)
ACM CCS
, pp. 387-398
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
6
-
-
1442292329
-
A composable cryptographic library with nested operations
-
M. Backes, B. Pfitzmann, and M. Waidner, "A composable cryptographic library with nested operations," in ACM CCS, 2003, pp. 220-230.
-
(2003)
ACM CCS
, pp. 220-230
-
-
Backes, M.1
Pfitzmann, B.2
Waidner, M.3
-
7
-
-
33749664425
-
Boogie: A modular reusable verifier for object-oriented programs
-
Formal Methods for Components and Objects - 4th International Symposium, FMCO 2005, Revised Lectures
-
M. Barnett, B.-Y. E. Chang, R. DeLine, B. Jacobs, and K. R. M. Leino, "Boogie: A modular reusable verifier for object-oriented programs," in FMCO, ser. LNCS, vol. 4111, 2005, pp. 364-387. (Pubitemid 44548955)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4111 LNCS
, pp. 364-387
-
-
Barnett, M.1
Chang, B.-Y.E.2
DeLine, R.3
Jacobs, B.4
Leino, K.R.M.5
-
8
-
-
67649846626
-
Formal certification of code-based cryptographic proofs
-
G. Barthe, B. Grégoire, and S. Z. Béguelin, "Formal certification of code-based cryptographic proofs," in POPL, 2009, pp. 90-101.
-
(2009)
POPL
, pp. 90-101
-
-
Barthe, G.1
Grégoire, B.2
Béguelin, S.Z.3
-
9
-
-
79951546693
-
Refinement types for secure implementations
-
J. Bengtson, K. Bhargavan, C. Fournet, A. D. Gordon, and S. Maffeis, "Refinement types for secure implementations,"ACM TOPLAS, vol. 33, no. 2, p. 8, 2011.
-
(2011)
ACM TOPLAS
, vol.33
, Issue.2
, pp. 8
-
-
Bengtson, J.1
Bhargavan, K.2
Fournet, C.3
Gordon, A.D.4
Maffeis, S.5
-
10
-
-
57849126802
-
Verified interoperable implementations of security protocols
-
December
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse, "Verified interoperable implementations of security protocols," ACM TOPLAS, vol. 31, pp. 5:1-5:61, December 2008.
-
(2008)
ACM TOPLAS
, vol.31
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
11
-
-
57849106656
-
Cryptographically verified implementations for tls
-
K. Bhargavan, C. Fournet, R. Corin, and E. Zalinescu, "Cryptographically verified implementations for tls," in ACM CCS, 2008, pp. 459-468.
-
(2008)
ACM CCS
, pp. 459-468
-
-
Bhargavan, K.1
Fournet, C.2
Corin, R.3
Zalinescu, E.4
-
12
-
-
77950909049
-
Modular verification of security protocol code by typing
-
K. Bhargavan, C. Fournet, and A. D. Gordon, "Modular verification of security protocol code by typing," in POPL, 2010, pp. 445-456.
-
(2010)
POPL
, pp. 445-456
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
13
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules," in CSFW, 2001, pp. 82-96.
-
(2001)
CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
14
-
-
33751067991
-
A computationally sound mechanized prover for security protocols
-
-, "A computationally sound mechanized prover for security protocols," in IEEE Symposium on Security and Privacy, 2006, pp. 140-154.
-
IEEE Symposium on Security and Privacy, 2006
, pp. 140-154
-
-
-
15
-
-
49949119291
-
Breaking and fixing public-key Kerberos
-
ASIAN, ser.
-
I. Cervesato, A. D. Jaggard, A. Scedrov, J.-K. Tsay, and C. Walstad, "Breaking and fixing public-key Kerberos," in ASIAN, ser. LNCS, vol. 4435, 2006, pp. 167-181.
-
(2006)
LNCS
, vol.4435
, pp. 167-181
-
-
Cervesato, I.1
Jaggard, A.D.2
Scedrov, A.3
Tsay, J.-K.4
Walstad, C.5
-
17
-
-
0037271415
-
First-order verification of cryptographic protocols
-
E. Cohen, "First-order verification of cryptographic protocols,"Journal of Computer Security, vol. 11, no. 2, pp. 189-216, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 189-216
-
-
Cohen, E.1
-
18
-
-
70349325391
-
VCC: A practical system for verifying concurrent C
-
TPHOLs, ser.
-
E. Cohen, M. Dahlweid, M. A. Hillebrand, D. Leinenbach, M. Moskal, T. Santen, W. Schulte, and S. Tobies, "VCC: A practical system for verifying concurrent C," in TPHOLs, ser. LNCS, vol. 5674, 2009, pp. 23-42.
-
(2009)
LNCS
, vol.5674
, pp. 23-42
-
-
Cohen, E.1
Dahlweid, M.2
Hillebrand, M.A.3
Leinenbach, D.4
Moskal, M.5
Santen, T.6
Schulte, W.7
Tobies, S.8
-
19
-
-
77954963599
-
Local verification of global invariants in concurrent programs
-
CAV, ser.
-
E. Cohen, M. Moskal, W. Schulte, and S. Tobies, "Local verification of global invariants in concurrent programs," in CAV, ser. LNCS, vol. 6174, 2010, pp. 480-494.
-
(2010)
LNCS
, vol.6174
, pp. 480-494
-
-
Cohen, E.1
Moskal, M.2
Schulte, W.3
Tobies, S.4
-
20
-
-
77955233685
-
From total store order to sequential consistency: A practical reduction theorem
-
Interactive Theorem Proving, ser.
-
E. Cohen and B. Schirmer, "From total store order to sequential consistency: A practical reduction theorem," in Interactive Theorem Proving, ser. LNCS, vol. 6172, 2010, pp. 403-418.
-
(2010)
LNCS
, vol.6172
, pp. 403-418
-
-
Cohen, E.1
Schirmer, B.2
-
21
-
-
79551546339
-
Efficient symbolic execution for analysing cryptographic protocol implementations
-
ESSoS, ser.
-
R. Corin and F. A. Manzano, "Efficient symbolic execution for analysing cryptographic protocol implementations," in ESSoS, ser. LNCS, vol. 6542, 2011, pp. 58-72.
-
(2011)
LNCS
, vol.6542
, pp. 58-72
-
-
Corin, R.1
Manzano, F.A.2
-
23
-
-
45749085681
-
Z3: An efficient SMT solver
-
TACAS, ser.
-
L. M. De Moura and N. Bjørner, "Z3: An efficient SMT solver," in TACAS, ser. LNCS, vol. 4963, 2008, pp. 337-340.
-
(2008)
LNCS
, vol.4963
, pp. 337-340
-
-
De Moura, L.M.1
Bjørner, N.2
-
24
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. C.-C. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-207, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-207
-
-
Dolev, D.1
Yao, A.C.-C.2
-
26
-
-
85170389667
-
-
Tech. Rep. MSR-TR-2011-50
-
F. Dupressoir, A. Gordon, J. Jürjens, and D. Naumann, "Guiding a general-purpose C verifier to prove cryptographic protocols," Tech. Rep. MSR-TR-2011-50, 2011.
-
(2011)
Guiding A General-purpose C Verifier to Prove Cryptographic Protocols
-
-
Dupressoir, F.1
Gordon, A.2
Jürjens, J.3
Naumann, D.4
-
30
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
Verification, Model Checking, and Abstract Interpretation - 6th International Conference, VMCAI 2005
-
J. Goubault-Larrecq and F. Parrennes, "Cryptographic protocol analysis on real c code," in VMCAI, ser. LNCS, vol. 3385, 2005, pp. 363-379. (Pubitemid 41231372)
-
(2005)
Lecture Notes in Computer Science
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
31
-
-
24144433896
-
Implementing a formally verifiable security protocol in Java Card
-
Security in Pervasive Computing, ser.
-
E. Hubbers, M. Oostdijk, and E. Poll, "Implementing a formally verifiable security protocol in Java Card," in Security in Pervasive Computing, ser. LNCS, vol. 2802, 2004, pp. 213-226.
-
(2004)
LNCS
, vol.2802
, pp. 213-226
-
-
Hubbers, E.1
Oostdijk, M.2
Poll, E.3
-
33
-
-
80052678463
-
Dynamic model checking of C cryptographic protocol implementations
-
A. S. A. Jeffrey and R. Ley-Wild, "Dynamic model checking of C cryptographic protocol implementations," in FCS-ARSPA, 2006.
-
(2006)
FCS-ARSPA
-
-
Jeffrey, A.S.A.1
Ley-Wild, R.2
-
34
-
-
34547455692
-
Security analysis of crypto-based java programs using automated theorem provers
-
J. Jürjens, "Security analysis of crypto-based java programs using automated theorem provers," in ASE, 2006, pp. 167-176.
-
(2006)
ASE
, pp. 167-176
-
-
Jürjens, J.1
-
35
-
-
33745802808
-
Formal certification of a compiler back-end or: Programming a compiler with a proof assistant
-
X. Leroy, "Formal certification of a compiler back-end or: programming a compiler with a proof assistant," in POPL, 2006, pp. 42-54.
-
(2006)
POPL
, pp. 42-54
-
-
Leroy, X.1
-
36
-
-
77955217681
-
Chip and PIN is broken
-
S. J. Murdoch, S. Drimer, R. J. Anderson, and M. Bond, "Chip and PIN is broken," in IEEE Symposium on Security and Privacy, 2010, pp. 433-446.
-
IEEE Symposium on Security and Privacy, 2010
, pp. 433-446
-
-
Murdoch, S.J.1
Drimer, S.2
Anderson, R.J.3
Bond, M.4
-
37
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12, pp. 993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
39
-
-
85170368809
-
-
Offspark, Online. Available
-
Offspark, "Polarssl," 2008. [Online]. Available: http://polarssl.org
-
(2008)
Polarssl
-
-
-
40
-
-
84889918117
-
Using Elyjah to analyse Java implementations of cryptographic protocols
-
N. O'Shea, "Using Elyjah to analyse Java implementations of cryptographic protocols," in FCS-ARSPA-WITS, 2008, pp. 211-223.
-
FCS-ARSPA-WITS, 2008
, pp. 211-223
-
-
O'Shea, N.1
-
41
-
-
36549020488
-
Rule-based static analysis of network protocol implementations
-
O. Udrea, C. Lumezanu, and J. S. Foster, "Rule-based static analysis of network protocol implementations," USENIX Security Symposium, pp. 193-208, 2006.
-
(2006)
USENIX Security Symposium
, pp. 193-208
-
-
Udrea, O.1
Lumezanu, C.2
Foster, J.S.3
|