-
1
-
-
0036040302
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi and B. Blanchet. Analyzing Security Protocols with Secrecy Types and Logic Programs. In Proc. POPL 2002, pages 33-44, 2002
-
(2002)
Proc. POPL 2002
, pp. 33-44
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
84961379291
-
Lazy infinite-state analysis of security protocols
-
D. Basin. Lazy infinite-state analysis of security protocols. Secure Networking-CQRE [Secure] '99, LNCS 1740, pages 30-42, 1999
-
(1999)
Secure Networking-CQRE [Secure] '99, LNCS
, vol.1740
, pp. 30-42
-
-
Basin, D.1
-
5
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Proc. CSFW'01, 2001
-
(2001)
Proc. CSFW'01
-
-
Blanchet, B.1
-
6
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Trans. on Computer Systems, 8(1):18-36, 1990
-
(1990)
ACM Trans. on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0032671775
-
A meta-notation for protocol analysis
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. A meta-notation for protocol analysis. In Proc. CSFW '99, pages 55-69, 1999
-
(1999)
Proc. CSFW '99
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
8
-
-
0033698744
-
Relating strands and multiset rewriting for security protocol analysis
-
I. Cervesato, N. Durgin, J. Mitchell. Lincoln, and A. Scedrov. Relating strands and multiset rewriting for security protocol analysis. In Proc. CSFW '00, pages 35-51, 2000
-
(2000)
Proc. CSFW '00
, pp. 35-51
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, J.M.3
Scedrov, A.4
-
11
-
-
84879477746
-
Towards efficient automated verification of security protocols
-
Y.Chevalier and L.Vigneron. Towards efficient automated verification of security protocols. In Proc. VERIF '01, 2001
-
(2001)
Proc. VERIF '01
-
-
Chevalier, Y.1
Vigneron, L.2
-
12
-
-
23044522745
-
Specifying and debugging security protocols via hereditary harrop formulas and lambda prolog
-
G. Delzanno. Specifying and debugging security protocols via hereditary harrop formulas and lambda prolog. In Proc. FLOPS '01, pages 123-137, 2001
-
(2001)
Proc. FLOPS '01
, pp. 123-137
-
-
Delzanno, G.1
-
13
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Trans. on Information Theory, 29(2):198-208, 1983
-
(1983)
IEEE Trans. on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
15
-
-
30144439153
-
Efficient infinite-state analysis of security protocols
-
A. Huima. Efficient infinite-state analysis of security protocols. In Proc. FMSP '99 (FLOC '99), 1999
-
(1999)
Proc. FMSP '99 (FLOC '99)
-
-
Huima, A.1
-
16
-
-
84956860311
-
Compiling and verifying security protocols
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and verifying security protocols. In Proc. LPAR 2000, LNCS 1995, pages 131-160, 2000
-
(2000)
Proc. LPAR 2000, LNCS
, vol.1995
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
17
-
-
26444574191
-
Breaking and fixing the needham-schroeder public-key protocol using fdr
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software Concepts and Tools, (17):93-102, 1996
-
(1996)
Software Concepts and Tools
, Issue.17
, pp. 93-102
-
-
Lowe, G.1
-
18
-
-
0030678388
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: A compiler for the analysis of security protocols. In Proc.CSFW '97, pages 18-30, 1997
-
(1997)
Proc.CSFW '97
, pp. 18-30
-
-
Lowe, G.1
-
19
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
G. Lowe. Towards a completeness result for model checking of security protocols. J. of Computer Security, 7(2-3):89-146, 1998
-
(1998)
J. of Computer Security
, vol.7
, Issue.2-3
, pp. 89-146
-
-
Lowe, G.1
-
20
-
-
84955602379
-
Formal verification of cryptographic protocols: A survey
-
C. Meadows. Formal verification of cryptographic protocols: A survey. In Proc. ASIACRYPT '94, pages 133-150, 1995
-
(1995)
Proc. ASIACRYPT '94
, pp. 133-150
-
-
Meadows, C.1
-
21
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: An overview. J. of Logic Programming, 26(2):113-131, 1996
-
(1996)
J. of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
23
-
-
0023295108
-
The interrogator: Protocol security analysis
-
J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol security analysis. IEEE Trans. on Software Engineering, 13(2):274-288, 1987
-
(1987)
IEEE Trans. on Software Engineering
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
25
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Comm. of the ACM, 21(12):993-999, 1978
-
(1978)
Comm. of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
27
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. J. of Computer Security, 6:85-128, 1998
-
(1998)
J. of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
30
-
-
0034822801
-
Protocol insecurity with finite number of sessions is np-complete
-
M. Rusinowitch and M. Turuani. Protocol insecurity with finite number of sessions is np-complete. In Proc. CSFW '01, 2001.
-
(2001)
Proc. CSFW '01
-
-
Rusinowitch, M.1
Turuani, M.2
|