-
1
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Computer Aided Verification: 17th International Conference, CAV 2005. Proceedings
-
Armando, A., Basin, D. A., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Héam, P.-C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005) (Pubitemid 41431740)
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Heam, P.C.8
Kouchnarenko, O.9
Mantovani, J.10
Modersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigano, L.16
Vigneron, L.17
-
2
-
-
84887471494
-
LTL model checking for security protocols
-
Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. Journal of Applied Non-Classical Logics, special issue on Logic and Information Security, 403-429 (2009)
-
(2009)
Journal of Applied Non-classical Logics, Special issue on Logic and Information Security
, pp. 403-429
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
-
5
-
-
84855534913
-
-
AVISPA Project, http://www.avispa-project.org
-
-
-
-
7
-
-
35048821943
-
TulaFale: A security tool for web services
-
Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: TulaFale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol. 3188, pp. 197-222. Springer, Heidelberg (2004) (Pubitemid 39749529)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3188
, pp. 197-222
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Pucella, R.4
-
8
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of CSFW 2001, pp. 82-96. IEEE Computer Society Press, Los Alamitos (2001) (Pubitemid 32877779)
-
(2001)
Proceedings of the Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
9
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems 8(1), 18-36 (1990)
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
10
-
-
23144433992
-
A high level protocol specification language for industrial security-sensitive protocols
-
Austrian Computer Society
-
Chevalier, Y., Compagna, L., Cuéllar, J., Hankes Drielsma, P., Mantovani, J., Mödersheim, S., Vigneron, L.: A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols. In: Automated Software Engineering. Proc. SAPS 2004 Workshop, pp. 193-205. Austrian Computer Society (2004)
-
(2004)
Automated Software Engineering. Proc. SAPS 2004 Workshop
, pp. 193-205
-
-
Chevalier, Y.1
Compagna, L.2
Cuéllar, J.3
Hankes Drielsma, P.4
Mantovani, J.5
Mödersheim, S.6
Vigneron, L.7
-
11
-
-
77957575144
-
Protocol composition for arbitrary primitives
-
Ciobâca, S., Cortier, V.: Protocol composition for arbitrary primitives. In: Proceedings of CSF, pp. 322-336 (2010)
-
(2010)
Proceedings of CSF
, pp. 322-336
-
-
Ciobâca, S.1
Cortier, V.2
-
12
-
-
79955859023
-
New decidability results for fragments of first-order logic and application to cryptographic protocols
-
ENS de Cachan, France
-
Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. Technical Report LSV-03-3, Laboratoire Specification and Verification, ENS de Cachan, France (2003)
-
(2003)
Technical Report LSV-03-3, Laboratoire Specification and Verification
-
-
Comon-Lundh, H.1
Cortier, V.2
-
13
-
-
48949088211
-
The scyther tool: Verification, falsification, and analysis of security protocols
-
Gupta, A., Malik, S. (eds.) LNCS Springer, Heidelberg
-
Cremers, C.: The scyther tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
-
(2008)
CAV 2008
, vol.5123
, pp. 414-418
-
-
Cremers, C.1
-
14
-
-
0000372791
-
Klaim: A kernel language for agents interaction and mobility
-
De Nicola, R., Ferrari, G., Pugliese, R.: KLAIM: a kernel language for agents interaction and mobility. IEEE TSE 24(5), 315-330 (1998) (Pubitemid 128741958)
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.5
, pp. 315-330
-
-
De Nicola, R.1
Ferrari, G.L.2
Pugliese, R.3
-
15
-
-
0042500424
-
Undecidability of bounded security protocols
-
Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Undecidability of bounded security protocols. In: Proceedings of the Workshop on Formal Methods and Security Protocols (1999)
-
(1999)
Proceedings of the Workshop on Formal Methods and Security Protocols
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
16
-
-
70349314888
-
Maude-npa: Cryptographic protocol analysis modulo equational properties
-
Escobar, S., Meadows, C., Meseguer, J.: Maude-npa: Cryptographic protocol analysis modulo equational properties. In: FOSAD, pp. 1-50 (2007)
-
(2007)
FOSAD
, pp. 1-50
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
19
-
-
78650030226
-
Abstraction by set-membership - Verifying security protocols and web services with databases
-
ACM Press, New York
-
Mödersheim, S.: Abstraction by Set-Membership - Verifying Security Protocols and Web Services with Databases. In: Proceedings of 17th CCS. ACM Press, New York (2010)
-
(2010)
Proceedings of 17th CCS
-
-
Mödersheim, S.1
-
20
-
-
70349335930
-
The open-source fixed-point model checker for symbolic analysis of security protocols
-
Aldini, A., Barthe, G., Gorrieri, R. (eds.) LNCS Springer, Heidelberg
-
Mödersheim, S., Viganò, L.: The Open-source Fixed-point Model Checker for Symbolic Analysis of Security Protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) Fosad 2007-2008-2009. LNCS, vol. 5705, pp. 166-194. Springer, Heidelberg (2009)
-
(2009)
Fosad 2007-2008-2009
, vol.5705
, pp. 166-194
-
-
Mödersheim, S.1
Viganò, L.2
-
21
-
-
0034822801
-
Protocol insecurity with finite number of sessions is NP-complete
-
IEEE Computer Society, Los Alamitos
-
Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions is NP-complete. In: CSFW, p. 174. IEEE Computer Society, Los Alamitos (2001)
-
(2001)
CSFW
, pp. 174
-
-
Rusinowitch, M.1
Turuani, M.2
|