-
1
-
-
38349010575
-
Bounding messages for free in security protocols
-
Springer, Berlin
-
M. Arapinis and M. Duflot, Bounding messages for free in security protocols, in: Proceedings of the 27th International Conference on Foundations of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, Vol. 4855, Springer, Berlin, 2007, pp. 376-387.
-
(2007)
Proceedings of the 27th International Conference on Foundations of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science
, vol.4855
, pp. 376-387
-
-
Arapinis, M.1
Duflot, M.2
-
2
-
-
33749582048
-
Interpretation of locales in Isabelle: Theories and proof contexts
-
MKM, J.M. Borwein and W.M. Farmer, eds Springer, Berlin
-
C. Ballarin, Interpretation of locales in Isabelle: theories and proof contexts, in: MKM, J.M. Borwein and W.M. Farmer, eds, Lecture Notes in Computer Science, Vol. 4108, Springer, Berlin, 2006, pp. 31-43.
-
(2006)
Lecture Notes in Computer Science
, vol.4108
, pp. 31-43
-
-
Ballarin, C.1
-
3
-
-
80051978821
-
Computer-aided security proofs for the working cryptographer
-
Springer, Berlin
-
G. Barthe, B. Grégoire, S. Heraud and S. Zanella Béguelin, Computer-aided security proofs for the working cryptographer, in: Advances in Cryptology-CRYPTO 2011, Lecture Notes in Computer Science, Vol. 6841, Springer, Berlin, 2011, pp. 71-90.
-
(2011)
Advances in Cryptology-CRYPTO 2011, Lecture Notes in Computer Science
, vol.6841
, pp. 71-90
-
-
Barthe, G.1
Grégoire, B.2
Heraud, S.3
Zanella Béguelin, S.4
-
4
-
-
70350323754
-
Formal certification of code-based cryptographic proofs
-
ACM Press, New York, NY
-
G. Barthe, B. Grégoire and S. Zanella Béguelin, Formal certification of code-based cryptographic proofs, in: Proc. 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, ACM Press, New York, NY, 2009, pp. 90-101.
-
(2009)
Proc. 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 90-101
-
-
Barthe, G.1
Grégoire, B.2
Zanella Béguelin, S.3
-
5
-
-
84859302632
-
Provably repairing the ISO/IEC 9798 standard for entity authentication
-
Springer, Berlin
-
D. Basin, C. Cremers and S. Meier, Provably repairing the ISO/IEC 9798 standard for entity authentication, in: Proc. 1st International Conference on Principles of Security and Trust, Held as Part of ETAPS'2012, Tallinn, Lecture Notes in Computer Science, Vol. 7215, Springer, Berlin, 2012, pp. 129-148.
-
(2012)
Proc. 1st International Conference on Principles of Security and Trust, Held As Part of ETAPS'2012, Tallinn, Lecture Notes in Computer Science
, vol.7215
, pp. 129-148
-
-
Basin, D.1
Cremers, C.2
Meier, S.3
-
8
-
-
22444455879
-
Kerberos version 4: Inductive analysis of the secrecy goals
-
ESORICS, J.-J. Quisquater, Y. Deswarte, C. Meadows and D. Gollmann, eds Springer, Berlin
-
G. Bella and L.C. Paulson, Kerberos version 4: inductive analysis of the secrecy goals, in: ESORICS, J.-J. Quisquater, Y. Deswarte, C. Meadows and D. Gollmann, eds, Lecture Notes in Computer Science, Vol. 1485, Springer, Berlin, 1998, pp. 361-375.
-
(1998)
Lecture Notes in Computer Science
, vol.1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
9
-
-
77950909049
-
Modular verification of security protocol code by typing
-
M.V. Hermenegildo and J. Palsberg, eds, ACM Press, New York, NY
-
K. Bhargavan, C. Fournet and A.D. Gordon, Modular verification of security protocol code by typing, in: POPL, M.V. Hermenegildo and J. Palsberg, eds, ACM Press, New York, NY, 2010, pp. 445-456.
-
(2010)
POPL
, pp. 445-456
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
10
-
-
55949087657
-
A computationally sound mechanized prover for security protocols
-
B. Blanchet, A computationally sound mechanized prover for security protocols, IEEE Transactions on Dependable and Secure Computing 5(4) (2008), 193-207.
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.4
, pp. 193-207
-
-
Blanchet, B.1
-
11
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
B. Blanchet, Automatic verification of correspondences for security protocols, J. Comput. Secur. 17(4) (2009), 363-434.
-
(2009)
J. Comput. Secur.
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
13
-
-
77953255971
-
Integrating Automated and Interactive Protocol Verification In: Fo r-mal Aspects in Security and Trust
-
P. Degano and J. Guttman, eds Springer, Berlin
-
A. Brucker and S. Mödersheim, Integrating automated and interactive protocol verification, in: Fo r-mal Aspects in Security and Trust, P. Degano and J. Guttman, eds, Lecture Notes in Computer Science, Vol. 5983, Springer, Berlin, 2010, pp. 248-262.
-
(2010)
Lecture Notes in Computer Science
, vol.5983
, pp. 248-262
-
-
Brucker, A.1
Mödersheim, S.2
-
14
-
-
0037271415
-
First-order verification of cryptographic protocols
-
E. Cohen, First-order verification of cryptographic protocols, J. Comput. Secur. 11(2) (2003), 189-216.
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.2
, pp. 189-216
-
-
Cohen, E.1
-
15
-
-
67650240831
-
Unbounded verification, falsification and characterization of security protocols by pattern refinement
-
ACM Press, New York, NY
-
C. Cremers, Unbounded verification, falsification and characterization of security protocols by pattern refinement, in: Proceedings of the 15th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, 2008, pp. 119-128.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 119-128
-
-
Cremers, C.1
-
16
-
-
77957573129
-
Operational semantics of security protocols
-
S. Leue and T. Systä, eds, Revised Selected Papers, Lecture Notes in Computer Science Springer, Berlin
-
C. Cremers and S. Mauw, Operational semantics of security protocols, in: Proc. International Workshop on Scenarios: Models, Transformations and Tools, Dagstuhl Castle, Germany, S. Leue and T. Systä, eds, Revised Selected Papers, Lecture Notes in Computer Science, Vol. 3466, Springer, Berlin, 2005.
-
(2005)
Proc. International Workshop on Scenarios: Models, Transformations and Tools, Dagstuhl Castle, Germany
, vol.3466
-
-
Cremers, C.1
Mauw, S.2
-
17
-
-
33750487822
-
Injective synchronisation: An extension of the authentication hierarchy
-
C. Cremers, S. Mauw and E. de Vink, Injective synchronisation: an extension of the authentication hierarchy, Theor. Comput. Sci. 367 (2006), 139-161.
-
(2006)
Theor. Comput. Sci.
, vol.367
, pp. 139-161
-
-
Cremers, C.1
Mauw, S.2
De Vink, E.3
-
18
-
-
51749109372
-
Formal analysis of PKCS#11
-
Pittsburgh, PA, IEEE Computer Society, Los Alamitos, CA
-
S. Delaune, S. Kremer and G. Steel, Formal analysis of PKCS#11, in: Proceedings of the 21st IEEE Computer Security Foundations Symposium, Pittsburgh, PA, IEEE Computer Society, Los Alamitos, CA, 2008, pp. 331-344.
-
(2008)
Proceedings of the 21st IEEE Computer Security Foundations Symposium
, pp. 331-344
-
-
Delaune, S.1
Kremer, S.2
Steel, G.3
-
19
-
-
35048899619
-
Searching for shapes in cryptographic protocols, in: TACAS
-
O. Grumberg and M. Huth, eds Springer, Berlin
-
S.F. Doghmi, J.D. Guttman and F.J. Thayer, Searching for shapes in cryptographic protocols, in: TACAS, O. Grumberg and M. Huth, eds, Lecture Notes in Computer Science, Vol. 4424, Springer, Berlin, 2007, pp. 523-537.
-
(2007)
Lecture Notes in Computer Science
, vol.4424
, pp. 523-537
-
-
Doghmi, S.F.1
Guttman, J.D.2
Thayer, F.J.3
-
20
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
N.A. Durgin, P. Lincoln and J.C. Mitchell, Multiset rewriting and the complexity of bounded security protocols, J. Comput. Secur. 12(2) (2004), 247-311.
-
(2004)
J. Comput. Secur.
, vol.12
, Issue.2
, pp. 247-311
-
-
Durgin, N.A.1
Lincoln, P.2
Mitchell, J.C.3
-
21
-
-
20144370847
-
Verifying security protocols with PVS: Widening the rank function approach
-
N. Evans and S.A. Schneider, Verifying security protocols with PVS: widening the rank function approach, J. Log. Algebr. Program. 64(2) (2005), 253-284.
-
(2005)
J. Log. Algebr. Program.
, vol.64
, Issue.2
, pp. 253-284
-
-
Evans, N.1
Schneider, S.A.2
-
22
-
-
0042240361
-
Mechanizing programming logics in higher order logic
-
G. Birtwistle and P.A. Subrahmanyam, eds, Springer, New York
-
M.J.C. Gordon, Mechanizing programming logics in higher order logic, in: Current Trends in Hardware Verification and Automated Theorem Proving, G. Birtwistle and P.A. Subrahmanyam, eds, Springer, New York, 1989, pp. 387-439.
-
(1989)
Current Trends in Hardware Verification and Automated Theorem Proving
, pp. 387-439
-
-
Gordon, M.J.C.1
-
23
-
-
77957127463
-
Finite models for formal security proofs
-
J. Goubault-Larrecq, Finite models for formal security proofs, J. Comput. Secur. 18(6) (2010), 1247-1299.
-
(2010)
J. Comput. Secur.
, vol.18
, Issue.6
, pp. 1247-1299
-
-
Goubault-Larrecq, J.1
-
24
-
-
3042563843
-
Authentication tests and disjoint encryption: A design method for security protocols
-
J.D. Guttman, Authentication tests and disjoint encryption: a design method for security protocols, J. Comput. Secur. 12 (2004), 409-433.
-
(2004)
J. Comput. Secur.
, vol.12
, pp. 409-433
-
-
Guttman, J.D.1
-
25
-
-
0037268614
-
How to prevent type flaw attacks on security protocols
-
J. Heather, G. Lowe and S. Schneider, How to prevent type flaw attacks on security protocols, J. Comput. Secur. 11(2) (2003), 217-244.
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.2
, pp. 217-244
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
27
-
-
71749089654
-
Semantics and logic for security protocols
-
B. Jacobs and I. Hasuo, Semantics and logic for security protocols, J. Comput. Secur. 17(6) (2009), 909-944.
-
(2009)
J. Comput. Secur.
, vol.17
, Issue.6
, pp. 909-944
-
-
Jacobs, B.1
Hasuo, I.2
-
28
-
-
12744277366
-
On preventing type flaw attacks on security protocols with a simplified tagging scheme
-
Y. Li, W. Yang and C.-W. Huang, On preventing type flaw attacks on security protocols with a simplified tagging scheme, J. Inf. Sci. Eng. 21(1) (2005), 59-84.
-
(2005)
J. Inf. Sci. Eng.
, vol.21
, Issue.1
, pp. 59-84
-
-
Li, Y.1
Yang, W.2
Huang, C.-W.3
-
29
-
-
0030708255
-
A hierarchy of authentication specifications
-
Rockport, MA, IEEE Press
-
G. Lowe, A hierarchy of authentication specifications, in: Proc. 10th Computer Security Foundations Workshop, Rockport, MA, IEEE Press, 1997, pp. 31-43.
-
(1997)
Proc. 10th Computer Security Foundations Workshop
, pp. 31-43
-
-
Lowe, G.1
-
30
-
-
77956148457
-
How to evaluate the security of real-life cryptographic protocols?-The cases of ISO/IEC 29128 and CRYPTREC
-
Canary Islands, Spain, Revised Selected Papers, Lecture Notes in Computer Science Springer, Berlin
-
S. Matsuo, K. Miyazaki, A. Otsuka and D.A. Basin, How to evaluate the security of real-life cryptographic protocols?-The cases of ISO/IEC 29128 and CRYPTREC, in: Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR and WLC 2010, Tenerife, Canary Islands, Spain, Revised Selected Papers, Lecture Notes in Computer Science, Vol. 6054, Springer, Berlin, 2010, pp. 182-194.
-
(2010)
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR and WLC 2010, Tenerife
, vol.6054
, pp. 182-194
-
-
Matsuo, S.1
Miyazaki, K.2
Otsuka, A.3
Basin, D.A.4
-
32
-
-
77957568200
-
Strong invariants for the efficient construction of machine-checked protocol security proofs
-
S. Meier, C.J.F. Cremers and D.A. Basin, Strong invariants for the efficient construction of machine-checked protocol security proofs, in: CSF, IEEE Computer Society, 2010, pp. 231-245.
-
(2010)
CSF, IEEE Computer Society
, pp. 231-245
-
-
Meier, S.1
Cremers, C.J.F.2
Basin, D.A.3
-
33
-
-
70349335930
-
The open-source fixed-point model checker for symbolic analysis of security protocols, in: FOSAD
-
A. Aldini, G. Barthe and R. Gorrieri, eds Springer, Berlin
-
S. Mödersheim and L. Viganò, The open-source fixed-point model checker for symbolic analysis of security protocols, in: FOSAD, A. Aldini, G. Barthe and R. Gorrieri, eds, Lecture Notes in Computer Science, Vol. 5705, Springer, Berlin, 2009, pp. 166-194.
-
(2009)
Lecture Notes in Computer Science
, vol.5705
, pp. 166-194
-
-
Mödersheim, S.1
Viganò, L.2
-
34
-
-
0348126394
-
Isabelle/HOL-A proof assistant for higher-order logic
-
Springer, Berlin
-
T. Nipkow, L.C. Paulson and M. Wenzel, Isabelle/HOL-A Proof Assistant for Higher-Order Logic, Lecture Notes in Computer Science, Vol. 2283, Springer, Berlin, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2283
-
-
Nipkow, T.1
Paulson, L.C.2
Wenzel, M.3
-
35
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson, The inductive approach to verifying cryptographic protocols, J. Comput. Secur. 6 (1998), 85-128.
-
(1998)
J. Comput. Secur.
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
36
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
L.C. Paulson, Inductive analysis of the internet protocol TLS, ACM Trans. Inf. Syst. Secur. 2(3) (1999), 332-351.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
37
-
-
0034950756
-
Relations between secrets: Two formal analyses of the yahalom protocol
-
L.C. Paulson, Relations between secrets: two formal analyses of the Yahalom protocol, J. Comput. Secur. 9(3) (2001), 197-216.
-
(2001)
J. Comput. Secur.
, vol.9
, Issue.3
, pp. 197-216
-
-
Paulson, L.C.1
-
38
-
-
84866938883
-
Automated analysis of Diffie-Hellman protocols and advanced security properties
-
Cambridge MA, USA, IEEE Computer Society, Los Alamitos, CA
-
B. Schmidt, S. Meier, C. Cremers and D.A. Basin, Automated analysis of Diffie-Hellman protocols and advanced security properties, in: Proceedings of the 25rd IEEE Computer Security Foundations Symposium, Cambridge MA, USA, IEEE Computer Society, Los Alamitos, CA, 2012, pp. 78-94.
-
(2012)
Proceedings of the 25rd IEEE Computer Security Foundations Symposium
, pp. 78-94
-
-
Schmidt, B.1
Meier, S.2
Cremers, C.3
Basin, D.A.4
-
39
-
-
0030684956
-
Verifying authentication protocols with CSP
-
Rockport, MA, IEEE Press
-
S. Schneider, Verifying authentication protocols with CSP, in: Proc. 10th Computer Security Foundations Workshop, Rockport, MA, IEEE Press, 1997, pp. 3-17.
-
(1997)
Proc. 10th Computer Security Foundations Workshop
, pp. 3-17
-
-
Schneider, S.1
-
40
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. Song, S. Berezin and A. Perrig, Athena: a novel approach to efficient automatic security protocol analysis, J. Comput. Secur. 9 (2001), 47-74.
-
(2001)
J. Comput. Secur.
, vol.9
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
41
-
-
84874344811
-
-
SPORE-Security Protocols Open Repository
-
SPORE-Security Protocols Open Repository, 2005, http://www.lsv.ens- cachan.fr/spore.
-
(2005)
-
-
-
42
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F.J. Thayer, J.C. Herzog and J.D. Guttman, Strand spaces: proving security protocols correct, J. Comput. Secur. 7(1) (1999), 191-230.
-
(1999)
J. Comput. Secur.
, vol.7
, Issue.1
, pp. 191-230
-
-
Thayer, F.J.1
Herzog, J.C.2
Guttman, J.D.3
-
43
-
-
57049134167
-
The Isabelle framework, in: TPHOLs
-
O.A. Mohamed, C. Muñoz and S. Tahar, eds Springer, Berlin
-
M. Wenzel, L.C. Paulson and T. Nipkow, The Isabelle framework, in: TPHOLs, O.A. Mohamed, C. Muñoz and S. Tahar, eds, Lecture Notes in Computer Science, Vol. 5170. Springer, Berlin, 2008, pp. 33-38.
-
(2008)
Lecture Notes in Computer Science
, vol.5170
, pp. 33-38
-
-
Wenzel, M.1
Paulson, L.C.2
Nipkow, T.3
|