-
1
-
-
80755187803
-
Extracting and verifying cryptographic models from C protocol code by symbolic execution
-
ACM, New York
-
Aizatulin, M., Gordon, A.D., Jürjens, J.: Extracting and verifying cryptographic models from C protocol code by symbolic execution. In: CCS 2011, pp. 331-340. ACM, New York (2011)
-
(2011)
CCS 2011
, pp. 331-340
-
-
Aizatulin, M.1
Gordon, A.D.2
Jürjens, J.3
-
2
-
-
84869432338
-
Computational verification of C protocol implementations by symbolic execution
-
ACM, New York
-
Aizatulin, M., Gordon, A.D., Jürjens, J.: Computational verification of C protocol implementations by symbolic execution. In: CCS 2012, pp. 712-723. ACM, New York (2012)
-
(2012)
CCS 2012
, pp. 712-723
-
-
Aizatulin, M.1
Gordon, A.D.2
Jürjens, J.3
-
3
-
-
57849126802
-
Verified interoperable implementations of security protocols
-
Bhargavan, K., Fournet, C., Gordon, A., Tse, S.: Verified interoperable implementations of security protocols. ACM TOPLAS 31(1) (2008)
-
(2008)
ACM TOPLAS
, vol.31
, Issue.1
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.3
Tse, S.4
-
4
-
-
55949087657
-
A computationally sound mechanized prover for security protocols
-
Blanchet, B.: A computationally sound mechanized prover for security protocols. IEEE Transactions on Dependable and Secure Computing 5(4), 193-207 (2008)
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.4
, pp. 193-207
-
-
Blanchet, B.1
-
5
-
-
84866904130
-
Automatically verified mechanized proof of one-encryption key exchange
-
IEEE, Los Alamitos
-
Blanchet, B.: Automatically verified mechanized proof of one-encryption key exchange. In: CSF 2012, pp. 325-339. IEEE, Los Alamitos (2012)
-
(2012)
CSF 2012
, pp. 325-339
-
-
Blanchet, B.1
-
7
-
-
84869450610
-
From computationally-proved protocol specifications to implementations
-
IEEE, Los Alamitos
-
Cadé, D., Blanchet, B.: From computationally-proved protocol specifications to implementations. In: ARES 2012, pp. 65-74. IEEE, Los Alamitos (2012)
-
(2012)
ARES 2012
, pp. 65-74
-
-
Cadé, D.1
Blanchet, B.2
-
8
-
-
70350543796
-
ASPIER: An automated framework for verifying security protocol implementations
-
IEEE, Los Alamitos
-
Chaki, S., Datta, A.: ASPIER: An automated framework for verifying security protocol implementations. In: CSF 2009, pp. 172-185. IEEE, Los Alamitos (2009)
-
(2009)
CSF 2009
, pp. 172-185
-
-
Chaki, S.1
Datta, A.2
-
9
-
-
80052648343
-
Guiding a general-purpose C verifier to prove cryptographic protocols
-
IEEE, Los Alamitos
-
Dupressoir, F., Gordon, A.D., Jürjens, J., Naumann, D.A.: Guiding a general-purpose C verifier to prove cryptographic protocols. In: CSF 2011, pp. 3-17. IEEE, Los Alamitos (2011)
-
(2011)
CSF 2011
, pp. 3-17
-
-
Dupressoir, F.1
Gordon, A.D.2
Jürjens, J.3
Naumann, D.A.4
-
10
-
-
80755169483
-
Modular code-based cryptographic verification
-
ACM, New York
-
Fournet, C., Kohlweiss, M., Strub, P.Y.: Modular code-based cryptographic verification. In: CCS 2011, pp. 341-350. ACM, New York (2011)
-
(2011)
CCS 2011
, pp. 341-350
-
-
Fournet, C.1
Kohlweiss, M.2
Strub, P.Y.3
-
11
-
-
84874399729
-
-
http://msr-inria.inria.fr/projects/sec/fs2cv/
-
-
-
-
12
-
-
84859368981
-
χ-spaces: Programming security protocols
-
Milicia, G.: χ-spaces: Programming security protocols. In: NWPT 2002 (2002)
-
(2002)
NWPT 2002
-
-
Milicia, G.1
-
13
-
-
47249096280
-
A Sound Semantics for OCamllight
-
Drossopoulou, S. (ed.) ESOP 2008. Springer, Heidelberg
-
Owens, S.: A Sound Semantics for OCamllight . In: Drossopoulou, S. (ed.) ESOP 2008. LNCS, vol. 4960, pp. 1-15. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4960
, pp. 1-15
-
-
Owens, S.1
-
14
-
-
77949567843
-
Provably correct Java implementations of spi calculus security protocols specifications
-
Pironti, A., Sisto, R.: Provably correct Java implementations of spi calculus security protocols specifications. Computers and Security 29(3), 302-314 (2010)
-
(2010)
Computers and Security
, vol.29
, Issue.3
, pp. 302-314
-
-
Pironti, A.1
Sisto, R.2
-
15
-
-
80054054746
-
Secure distributed programming with value-dependent types
-
ACM, New York
-
Swamy, N., Chen, J., Fournet, C., Strub, P.Y., Bharagavan, K., Yang, J.: Secure distributed programming with value-dependent types. In: ICFP 2011, pp. 266-278. ACM, New York (2011)
-
(2011)
ICFP 2011
, pp. 266-278
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Strub, P.Y.4
Bharagavan, K.5
Yang, J.6
|