-
1
-
-
33747255010
-
Applying protocol analysis to security device interfaces
-
July-Aug
-
J. Herzog, "Applying protocol analysis to security device interfaces," IEEE Security & Privacy Magazine, vol. 4, no. 4, pp. 84-87, July-Aug 2006.
-
(2006)
IEEE Security & Privacy Magazine
, vol.4
, Issue.4
, pp. 84-87
-
-
Herzog, J.1
-
4
-
-
84878329642
-
A formal analysis of authentication in the TPM
-
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel, "A formal analysis of authentication in the TPM," in Proc. 7th International Workshop on Formal Aspects in Security and Trust (FAST'10), Pisa, Italy, 2010.
-
Proc. 7th International Workshop on Formal Aspects in Security and Trust (FAST'10), Pisa, Italy, 2010
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
Steel, G.4
-
5
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Cape Breton, Nova Scotia, Canada: IEEE Computer Society Press, Jun.
-
B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules," in Proc. of the 14th IEEE Computer Security Foundations Workshop (CSFW'01). Cape Breton, Nova Scotia, Canada: IEEE Computer Society Press, Jun. 2001, pp. 82-96.
-
(2001)
Proc. of the 14th IEEE Computer Security Foundations Workshop (CSFW'01)
, pp. 82-96
-
-
Blanchet, B.1
-
6
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuéllar, P. Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. Von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò, and L. Vigneron, "The AVISPA tool for the automated validation of internet security protocols and applications." in Proc. 17th International Conference on Computer Aided Verification (CAV'05), 2005, pp. 281-285.
-
Proc. 17th International Conference on Computer Aided Verification (CAV'05), 2005
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuéllar, J.6
Drielsma, P.7
Héam, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
7
-
-
70349337015
-
Analysing PKCS#11 key management APIs with unbounded fresh data
-
Proc. Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'09), ser. P. Degano and L. Viganò, Eds., York, UK: Springer, to appear
-
S. Fröschle and G. Steel, "Analysing PKCS#11 key management APIs with unbounded fresh data," in Proc. Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (ARSPA-WITS'09), ser. LNCS, P. Degano and L. Viganò, Eds., vol. 5511. York, UK: Springer, 2009, pp. 92-106, to appear.
-
(2009)
LNCS
, vol.5511
, pp. 92-106
-
-
Fröschle, S.1
Steel, G.2
-
8
-
-
80052679988
-
Formal analysis of protocols based on TPM state registers
-
IEEE Computer Society Press
-
S. Delaune, S. Kremer, M. D. Ryan, and G. Steel, "Formal analysis of protocols based on TPM state registers," in Proc. of the 24th IEEE Computer Security Foundations Symposium (CSF'11). IEEE Computer Society Press, 2011.
-
(2011)
Proc. of the 24th IEEE Computer Security Foundations Symposium (CSF'11)
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
Steel, G.4
-
9
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
B. Blanchet, "Automatic verification of correspondences for security protocols," Journal of Computer Security, vol. 17, no. 4, pp. 363-434, 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
10
-
-
17644411480
-
Mobile values, new names, and secure communication
-
H. R. Nielson, Ed. London, UK: ACM Press
-
M. Abadi and C. Fournet, "Mobile values, new names, and secure communication," in Proc. 28th Symposium on Principles of Programming Languages (POPL'01), H. R. Nielson, Ed. London, UK: ACM Press, 2001, pp. 104-115.
-
(2001)
Proc. 28th Symposium on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
11
-
-
84865526741
-
Automatic verification of correspondences for security protocols
-
B. Blanchet, "Automatic verification of correspondences for security protocols," CoRR, vol. abs/0802.3444, 2008.
-
(2008)
CoRR
, vol.ABS-0802.3444
-
-
Blanchet, B.1
-
12
-
-
84957060126
-
Abuse-free optimistic contract signing
-
J. A. Garay, M. Jakobsson, and P. D. MacKenzie, "Abuse-free optimistic contract signing," in Proceedings of the 19th Annual Cryptology Conference on Advances in Crypto, ser. CRYPTO '99, London, UK, 1999, pp. 449-466.
-
Proceedings of the 19th Annual Cryptology Conference on Advances in Crypto, Ser. CRYPTO '99, London, UK, 1999
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.D.3
|