-
1
-
-
0003761061
-
A calculus for cryptographic protocols: The spi calculus
-
Abadi, M.; Gordon, A.D.; 1998. A calculus for cryptographic protocols: the spi calculus. Research Report 149.
-
(1998)
Research Report 149
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
84857359448
-
-
Bangerter, E.; Camenisch, J.; Krenn, S.; Sadeghi, A.-R.; Schneider, T.; 2008. Automatic generation of sound zero-knowledge protocols, cryptology ePrint archive. Report 2008/471.
-
(2008)
Automatic Generation of Sound Zero-knowledge Protocols, Cryptology EPrint Archive. Report 2008/471
-
-
Bangerter, E.1
Camenisch, J.2
Krenn, S.3
Sadeghi, A.-R.4
Schneider, T.5
-
3
-
-
38549137266
-
JACK - A tool for validation of security and behaviour of java applications
-
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Barthe G.; Burdy L.; Charles J.; Grégoire B.; Huisman M.; Lanet J.-L.; Pavlova M.; and Requet A. JACK: a tool for validation of security and behaviour of Java applications International Symposium on Formal Methods for Components and Objects, LNCS 5382 2007 Springer 152 174 (Pubitemid 351152888)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4709
, pp. 152-174
-
-
Barthe, G.1
Burdy, L.2
Charles, J.3
Gregoire, B.4
Huisman, M.5
Lanet, J.-L.6
Pavlova, M.7
Requet, A.8
-
7
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
DOI 10.1109/CSFW.2006.32, 1648714, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
-
Bhargavan K.; Fournet C.; Gordon A.D.; and Tse S. Verified interoperable implementations of security protocols Computer Security Foundations Workshop 2006 IEEE Computer Society 139 152 (Pubitemid 46499723)
-
(2006)
Proceedings of the Computer Security Foundations Workshop
, vol.2006
, pp. 139-152
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
13
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
DOI 10.1016/j.jlap.2007.06.002, PII S1567832607000549
-
Blanchet B.; Abadi M.; and Fournet C. Automated verification of selected equivalences for security protocols Journal of Logic and Algebraic Programming 75 1 2008 3 51 (Pubitemid 351172997)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
14
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society
-
Bhargavan B. An efficient cryptographic protocol verifier based on prolog rules Computer Security Foundations Workshop 2001 IEEE Computer Society 82 96
-
(2001)
Computer Security Foundations Workshop
, pp. 82-96
-
-
Bhargavan, B.1
-
16
-
-
55949087657
-
A computationally sound mechanized prover for security protocols
-
Blanchet B. A computationally sound mechanized prover for security protocols IEEE Transactions on Dependable and Secure Computing 5 4 2008 193 207
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.4
, pp. 193-207
-
-
Blanchet, B.1
-
20
-
-
47249152310
-
Verification of Mondex electronic purses with KIV: From a security protocol to verified code
-
Springer
-
Grandy H.; Bischof M.; Stenzel K.; Schellhorn G.; and Reif W. Verification of Mondex electronic purses with KIV: from a security protocol to verified code Formal Methods, LNCS 5014 2008 Springer 165 180
-
(2008)
Formal Methods, LNCS 5014
, pp. 165-180
-
-
Grandy, H.1
Bischof, M.2
Stenzel, K.3
Schellhorn, G.4
Reif, W.5
-
22
-
-
69249215281
-
Automated security verification for crypto protocol implementations: Verifying the Jessie project
-
ISSN 1571-0661, doi:10.1016/j.entcs.2009.08.009
-
Jürjens J. Automated security verification for crypto protocol implementations: verifying the Jessie project Electronic Notes in Theoretical Computer Science 250 2009 123 136 ISSN 1571-0661, doi:10.1016/j.entcs.2009.08. 009
-
(2009)
Electronic Notes in Theoretical Computer Science
, vol.250
, pp. 123-136
-
-
Jürjens, J.1
-
24
-
-
33744474077
-
Automatic generation of the C# code for security protocols verified with casper/FDR
-
DOI 10.1109/AINA.2005.128, 1423744, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005
-
Jeon C.-W.; Kim I.-G.; and Choi J.-Y. Automatic generation of the C# code for security protocols verified with Casper/FDR International Conference on Advanced Information Networking and Applications 2005 IEEE Computer Society 507 510 (Pubitemid 43804079)
-
(2005)
Proceedings - International Conference on Advanced Information Networking and Applications, AINA
, vol.2
, pp. 507-510
-
-
Jeon, C.-W.1
Kim, I.-G.2
Choi, T.-Y.3
-
26
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Computer Society
-
Lowe G. A hierarchy of authentication specifications Computer Security Foundations Workshop 1997 IEEE Computer Society 31 43
-
(1997)
Computer Security Foundations Workshop
, pp. 31-43
-
-
Lowe, G.1
-
27
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
Lowe G. Casper: a compiler for the analysis of security protocols Journal of Computer Security 6 1-2 1998 53 84
-
(1998)
Journal of Computer Security
, vol.6
, Issue.12
, pp. 53-84
-
-
Lowe, G.1
-
28
-
-
70349335930
-
The open-source fixed-point model checker for symbolic analysis of security protocols
-
Springer
-
Mödersheim S.; and Vigan L. The open-source fixed-point model checker for symbolic analysis of security protocols Foundations of Security Analysis and Design, LNCS 5705 2009 Springer 166 194
-
(2009)
Foundations of Security Analysis and Design, LNCS 5705
, pp. 166-194
-
-
Mödersheim, S.1
Vigan, L.2
-
30
-
-
33745606237
-
Visual security protocol modeling
-
Proceedings New Security Paradigms Workshop 2005
-
McDermott J. Visual security protocol modeling Workshop on New Security Paradigms 2005 ACM 97 109 (Pubitemid 43990981)
-
(2006)
Proceedings New Security Paradigms Workshop
, vol.2006
, pp. 97-109
-
-
McDermott, J.1
-
33
-
-
48049092340
-
An experiment in interoperable cryptographic protocol implementation using automatic code generation
-
IEEE Computer Society
-
Pironti A.; and Sisto R. An experiment in interoperable cryptographic protocol implementation using automatic code generation IEEE Symposium on Computers and Communications 2007 IEEE Computer Society 839 844
-
(2007)
IEEE Symposium on Computers and Communications
, pp. 839-844
-
-
Pironti, A.1
Sisto, R.2
-
34
-
-
49049110544
-
Soundness conditions for message encoding abstractions in formal security protocol models
-
IEEE Computer Society
-
Pironti A.; and Sisto R. Soundness conditions for message encoding abstractions in formal security protocol models Availability, Reliability and Security 2008 IEEE Computer Society 72 79
-
(2008)
Availability, Reliability and Security
, pp. 72-79
-
-
Pironti, A.1
Sisto, R.2
-
35
-
-
77949567843
-
Provably correct Java implementations of spi calculus security protocols specifications
-
Pironti A.; and Sisto R. Provably correct Java implementations of spi calculus security protocols specifications Computers & Security 29 3 2010 302 314
-
(2010)
Computers & Security
, vol.29
, Issue.3
, pp. 302-314
-
-
Pironti, A.1
Sisto, R.2
-
39
-
-
84958777572
-
AGVI - Automatic Generation, Verification, and Implementation of Security Protocols
-
Computer Aided Verification
-
Song D.X.; Perrig A.; and Phan D. AGVI - automatic generation, verification, and implementation of security protocols International Conference on Computer Aided Verification 2001 Springer 241 245 (Pubitemid 33312919)
-
(2001)
LNCS
, Issue.2102
, pp. 241-245
-
-
Song, D.1
Perrig, A.2
Phan, D.3
|