-
1
-
-
48949088211
-
The Scyther Tool: Verification, falsification, and analysis of security protocols
-
Gupta, A., Malik, S. (eds.) CAV 2008. Springer, Heidelberg
-
Cremers, C.J.F.: The Scyther Tool: Verification, falsification, and analysis of security protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5123
, pp. 414-418
-
-
Cremers, C.J.F.1
-
2
-
-
38149012093
-
Stronger security of authenticated key exchange
-
Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. Springer, Heidelberg
-
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1-16. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4784
, pp. 1-16
-
-
LaMacchia, B.1
Lauter, K.2
Mityagin, A.3
-
3
-
-
84866938883
-
Automated analysis of Diffie-Hellman protocols and advanced security properties
-
IEEE
-
Schmidt, B., Meier, S., Cremers, C., Basin, D.: Automated analysis of Diffie-Hellman protocols and advanced security properties. In: Proc. CSF. IEEE (2012)
-
(2012)
Proc. CSF
-
-
Schmidt, B.1
Meier, S.2
Cremers, C.3
Basin, D.4
-
6
-
-
24944569389
-
The finite variant property: How to get rid of some algebraic properties
-
Term Rewriting and Applications: 16th International Conference, RTA 2005, Proceedings
-
Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294-307. Springer, Heidelberg (2005) (Pubitemid 41313364)
-
(2005)
Lecture Notes in Computer Science
, vol.3467
, pp. 294-307
-
-
Comon-Lundh, H.1
Delaune, S.2
-
7
-
-
84881181200
-
-
http://www.infsec.ethz.ch/research/software/tamarin
-
-
-
-
8
-
-
80052654636
-
Statverif: Verification of stateful processes
-
IEEE
-
Arapinis, M., Ritter, E., Ryan, M.: Statverif: Verification of stateful processes. In: Proc. CSF. IEEE (2011)
-
(2011)
Proc. CSF
-
-
Arapinis, M.1
Ritter, E.2
Ryan, M.3
-
9
-
-
78650030226
-
Abstraction by set-membership: Verifying security protocols and web services with databases
-
ACM
-
Mödersheim, S.: Abstraction by set-membership: verifying security protocols and web services with databases. In: Proc. CCS, pp. 351-360. ACM (2010)
-
(2010)
Proc. CCS
, pp. 351-360
-
-
Mödersheim, S.1
-
10
-
-
80052679988
-
Formal analysis of protocols based on TPM state registers
-
IEEE
-
Delaune, S., Kremer, S., Ryan, M.D., Steel, G.: Formal analysis of protocols based on TPM state registers. In: Proc. CSF, pp. 66-80. IEEE (2011)
-
(2011)
Proc. CSF
, pp. 66-80
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
Steel, G.4
-
11
-
-
84881154499
-
YubiSecure? Formal security analysis results for the YubiKey and YubiHSM
-
Jøsang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. Springer, Heidelberg
-
Künnemann, R., Steel, G.: YubiSecure? Formal security analysis results for the YubiKey and YubiHSM. In: Jøsang, A., Samarati, P., Petrocchi, M. (eds.) STM 2012. LNCS, vol. 7783, pp. 257-272. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7783
, pp. 257-272
-
-
Künnemann, R.1
Steel, G.2
-
12
-
-
33750477656
-
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
-
Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties. TCS 367, 162-202 (2006)
-
(2006)
TCS
, vol.367
, pp. 162-202
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
13
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE
-
Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proc. CSFW. IEEE (2001)
-
(2001)
Proc. CSFW
-
-
Blanchet, B.1
-
14
-
-
79956084660
-
Reducing protocol analysis with xor to the xor-free case in the Horn theory based approach
-
Küsters, R., Truderung, T.: Reducing protocol analysis with xor to the xor-free case in the Horn theory based approach. J. Autom. Reasoning 46(3-4), 325-352 (2011)
-
(2011)
J. Autom. Reasoning
, vol.46
, Issue.3-4
, pp. 325-352
-
-
Küsters, R.1
Truderung, T.2
-
15
-
-
84866948237
-
Symbolic analysis of cryptographic protocols containing bilinear pairings
-
IEEE
-
Pankova, A., Laud, P.: Symbolic analysis of cryptographic protocols containing bilinear pairings. In: Proc. CSF. IEEE (2012)
-
(2012)
Proc. CSF
-
-
Pankova, A.1
Laud, P.2
|