-
1
-
-
84982909952
-
Secure implementation of channel abstractions
-
Abadi M., Fournet C., Gonthier G., "Secure Implementation of Channel Abstractions", LICS, pp. 105-116, 1998
-
(1998)
LICS
, pp. 105-116
-
-
Abadi, M.1
Fournet, C.2
Gonthier, G.3
-
2
-
-
26444497860
-
The AVISPA Tool for the automated validation of internet security protocols and applications
-
Springer-Verlag Available at
-
Armando A., Basin D., Boichut Y., Chevalier Y., Compagna L., Cuellar J., Hankes Drielsma P., Heám P.-C., Mantovani J., Mödersheim S., von Oheimb D., Rusinowitch M., Santiago J., Turuani M., Viganò L., Vigneron L., "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications", Proceedings of the 17th International Conference on Computer Aided Verification (CAV?05), Springer-Verlag, 2005. Available at www.avispa-project.org
-
(2005)
Proceedings of the 17th International Conference on Computer Aided Verification (CAV?05)
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Hankes Drielsma, P.7
Heám, P.-C.8
Mantovani, J.9
Mödersheim, S.10
Von Oheimb, D.11
Rusinowitch, M.12
Santiago, J.13
Turuani, M.14
Viganò, L.15
Vigneron, L.16
-
3
-
-
70349233792
-
Formal analysis of SAML 2.0 Web browser single sign-on: Breaking the saml-based single sign-on for google apps"
-
V. Shmatikov (ed) ACM Press
-
Armando A., Carbone R., Compagna L., Cuellar J., Abad L. T., "Formal Analysis of SAML 2.0 Web Browser Single Sign-On: Breaking the SAML-based Single Sign-On for Google Apps", in V. Shmatikov (ed.), Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), ACM Press, pp. 1-10, 2008
-
(2008)
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008)
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Abad, L.T.5
-
4
-
-
84954313527
-
Automatic SAT-Compilation of protocol insecurity problems via reduction to planning
-
D. Peled, M. Vardi (eds) Springer-Verlag Also presented at the FCS & Verify Workshops, Copenhagen, Denmark, July 2002. Available at
-
Armando A., Compagna L., "Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning", in D. Peled, M. Vardi (eds), Proceedings of 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE), LNCS 2529, Springer-Verlag, pp. 210-225, 2002. Also presented at the FCS & Verify Workshops, Copenhagen, Denmark, July 2002. Available at www. avispa-project.org
-
(2002)
Proceedings of 22nd IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE) LNCS 2529
, pp. 210-225
-
-
Armando, A.1
Compagna, L.2
-
5
-
-
22944445210
-
SATMC: A SAT-based model checker for security protocols
-
Springer-Verlag, Lisbon, Portugal
-
Armando A., Compagna L., "SATMC: a SAT-based Model Checker for Security Protocols", Proceedings of the 9th European Conference on Logics in Artificial Intelligence (JELIA?04), vol. 3229 of LNAI, Springer-Verlag, Lisbon, Portugal, pp. 730-733, 2004
-
(2004)
Proceedings of the 9th European Conference on Logics in Artificial Intelligence JELIA?04 of LNAI
, vol.3229
, pp. 730-733
-
-
Armando, A.1
Compagna, L.2
-
6
-
-
38149132464
-
SAT-based model-checking for security protocols analysis
-
to appear on Available at
-
Armando A., Compagna L., "SAT-based Model-Checking for Security Protocols Analysis", International Journal of Information Security (to appear on), 2007. Available at http://www.ai-lab.it/compagna/papers/IJIS-2006/ paper.pdf
-
(2007)
International Journal of Information Security
-
-
Armando, A.1
Compagna, L.2
-
7
-
-
35248876774
-
SAT-based model-checking of security protocols using planning graph analysis
-
K. Araki, S. Gnesi, D. Mandrioli (eds) LNCS 2805, Springer-Verlag Available at
-
Armando A., Compagna L., Ganty P., "SAT-based Model-Checking of Security Protocols using Planning Graph Analysis", in K. Araki, S. Gnesi, D. Mandrioli (eds), Proceedings of the 12th International Symposium of Formal Methods Europe (FME), LNCS 2805, Springer- Verlag, pp. 875-893, 2003. Available at www.avispa-project.org
-
(2003)
Proceedings of the 12th International Symposium of Formal Methods Europe (FME)
, pp. 875-893
-
-
Armando, A.1
Compagna, L.2
Ganty, P.3
-
8
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
Asokan N., Shoup V., Waidner M., "Asynchronous protocols for optimistic fair exchange", Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 86-99, 1998
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
9
-
-
84961379291
-
Lazy infinite-state analysis of security protocols
-
R. Baumgart (ed) LNCS 1740, Springer-Verlag
-
Basin D., "Lazy Infinite-State Analysis of Security Protocols", in R. Baumgart (ed.), Secure Networking - CQRE (Secure)?99, LNCS 1740, Springer-Verlag, pp. 30-42, 1999
-
(1999)
Secure Networking-CQRE (Secure)?99
, pp. 30-42
-
-
Basin, D.1
-
10
-
-
33646262130
-
Algebraic intruder deductions"
-
G. Sutcliffe, A. Voronkov (eds) Springer
-
Basin D., Mödersheim S., Viganò L., "Algebraic Intruder Deductions", in G. Sutcliffe, A. Voronkov (eds), Proceedings of LPAR?05, LNAI 3835, Springer, pp. 549-564, 2005
-
(2005)
Proceedings of LPAR?05, LNAI
, vol.3835
, pp. 549-564
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
11
-
-
84944319371
-
Symbolic model checking without BDDs
-
Springer-Verlag
-
Biere A., Cimatti A., Clarke E., Zhu Y., "Symbolic Model Checking without BDDs", Proceedings of TACAS?99, LNCS 1579, Springer-Verlag, pp. 193-207, 1999
-
(1999)
Proceedings of TACAS?99, LNCS 1579
, pp. 193-207
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.3
Zhu, Y.4
-
13
-
-
34547372939
-
An intruder model for verifying liveness in security protocols
-
M. Winslett, A. D. Gordon, D. Sands (eds)
-
Cederquist J., Dashti M. T., "An intruder model for verifying liveness in security protocols", in M. Winslett, A. D. Gordon, D. Sands (eds), FMSE, ACM, pp. 23-32, 2006
-
(2006)
FMSE ACM
, pp. 23-32
-
-
Cederquist, J.1
Dashti, M.T.2
-
14
-
-
0032671775
-
A meta-notation for protocol analysis
-
Cervesato I., Durgin N., Lincoln P., Mitchell J., Scedrov A., "A meta-notation for protocol analysis", Proceedings of the 12th IEEE Computer Security Foundations Workshop: CSFW?99, IEEE Computer Society Press, pp. 55-69, 1999
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop: CSFW?99 IEEE Computer Society Press
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
15
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
Available at
-
Chevalier Y., Küsters R., Rusinowitch M., Turuani M., "An NP Decision Procedure for Protocol Insecurity with XOR", Proceedings of the Logic In Computer Science Conference, LICS?03, pp. 261-270, 2003. Available at http://www.avispa-project.org
-
(2003)
Proceedings of the Logic in Computer Science Conference, LICS?03
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
18
-
-
24944569389
-
The finite variant property: How to get rid of some algebraic properties
-
J. Giesl (ed) Springer, Nara, Japan April
-
Comon-Lundh H., Delaune S., "The finite variant property: How to get rid of some algebraic properties", in J. Giesl (ed.), Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA?05), vol. 3467 of Lecture Notes in Computer Science, Springer, Nara, Japan, pp. 294-307, April, 2005
-
(2005)
Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA?05) of Lecture Notes in Computer Science
, vol.3467
, pp. 294-307
-
-
Comon-Lundh, H.1
Delaune, S.2
-
22
-
-
38049169637
-
Formalizing and analyzing sender invariance
-
T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, S. A. Schneider (eds) Springer
-
Drielsma P. H., Mödersheim S., Viganò L., Basin D. A., "Formalizing and Analyzing Sender Invariance", in T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, S. A. Schneider (eds), Formal Aspects in Security and Trust, vol. 4691 of Lecture Notes in Computer Science, Springer, pp. 80-95, 2006
-
(2006)
Formal Aspects in Security and Trust of Lecture Notes in Computer Science
, vol.4691
, pp. 80-95
-
-
Drielsma, P.H.1
Mödersheim, S.2
Viganò, L.3
Basin, D.A.4
-
23
-
-
33646034935
-
Browser model for security analysis of browser-based protocols
-
Springer-Verlag, Berlin Germany, October
-
Gross T., Pfitzmann B., Sadeghi A.-R., "Browser Model for Security Analysis of Browser-Based Protocols", Proceedings of the Eight ESORICS, vol. 3679 of Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, October, 2005
-
(2005)
Proceedings of the Eight ESORICS of Lecture Notes in Computer Science
, vol.3679
-
-
Gross, T.1
Pfitzmann, B.2
Sadeghi, A.-R.3
-
25
-
-
26844469379
-
A formalization of off-line guessing for security protocol analysis
-
F. Baader, A. Voronkov (eds)
-
Hankes Drielsma P., Mödersheim S., Viganò L., "A Formalization of Off-Line Guessing for Security Protocol Analysis", in F. Baader, A. Voronkov (eds), Proceedings of LPAR?04, vol. 3452 of LNAI, Springer, pp. 363-379, 2005
-
(2005)
Proceedings of LPAR?04 of LNAI Springer
, vol.3452
, pp. 363-379
-
-
Hankes Drielsma, P.1
Mödersheim, S.2
Viganò, L.3
-
26
-
-
84956860311
-
Compiling and verifying security protocols
-
M. Parigot, A. Voronkov (eds) Springer-Verlag
-
Jacquemard F., Rusinowitch M., Vigneron L., "Compiling and Verifying Security Protocols", in M. Parigot, A. Voronkov (eds), Proceedings of LPAR 2000, LNCS 1955, Springer-Verlag, pp. 131-160, 2000
-
(2000)
Proceedings of LPAR 2000, LNCS 1955
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
27
-
-
82755187161
-
-
Technical Report num. 0702, Institut für Informatik, CAU Kiel, Germany
-
Kähler D., Küsters R., Truderung T., Infinite State AMC-Model Checking for Cryptographic Protocols, Technical Report num. 0702, Institut für Informatik, CAU Kiel, Germany, 2007a.
-
(2007)
Infinite State AMC-Model Checking for Cryptographic Protocols
-
-
Kähler, D.1
Küsters, R.2
Truderung, T.3
-
28
-
-
70350381707
-
Infinite state AMC-Model checking for cryptographic protocols
-
IEEE, Computer Society Press
-
Kähler D., Küsters R., Truderung T., "Infinite State AMC-Model Checking for Cryptographic Protocols", Proceedings of the Twenty-Second Annual IEEE Symposium on Logic in Computer Science (LICS 2007), IEEE, Computer Society Press, pp. 181-190, 2007b
-
(2007)
Proceedings of the Twenty-Second Annual IEEE Symposium on Logic in Computer Science (LICS 2007)
, pp. 181-190
-
-
Kähler, D.1
Küsters, R.2
Truderung, T.3
-
29
-
-
70449412265
-
Automatic methods for analyzing non-repudiation protocols with an active intruder
-
P. Degano, J. Guttman, F. Martinelli (eds) To appear as LNCS
-
Klay F., Vigneron L., "Automatic Methods for Analyzing Non-Repudiation Protocols with an Active Intruder", in P. Degano, J. Guttman, F. Martinelli (eds), 5th International Workshop on Formal Aspects in Security and Trust (FAST), pp. 165-180, 2008. To appear as LNCS
-
(2008)
5th International Workshop on Formal Aspects in Security and Trust (FAST)
, pp. 165-180
-
-
Klay, F.1
Vigneron, L.2
-
30
-
-
4944228536
-
Analysing protocols subject to guessing attacks
-
J. Guttman (ed) Portland, Oregon, USA January
-
Lowe G., "Analysing protocols subject to guessing attacks", in J. Guttman (ed.), Workshop on Issues in the Theory of Security (WITS?02), Portland, Oregon, USA, January, 2002
-
(2002)
Workshop on Issues in the Theory of Security (WITS?02)
-
-
Lowe, G.1
-
31
-
-
0030232808
-
A calculus for security bootstrapping in distributed systems
-
Maurer U. M., Schmid P. E., "A Calculus for Security Bootstrapping in Distributed Systems", Journal of Computer Security, vol. 4, num. 1, pp. 55-80, 1996
-
(1996)
Journal of Computer Security
, vol.4
, Issue.1
, pp. 55-80
-
-
Maurer, U.M.1
Schmid, P.E.2
-
32
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
See
-
Meadows C., "The NRL Protocol Analyzer: An Overview", Journal of Logic Programming, vol. 26, num. 2, pp. 113-131, 1996. See http://chacs.nrl.navy.mil/projects/crypto.html
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
35
-
-
84948779843
-
Game analysis of abuse-free contract signing
-
IEEE Computer Society Press June
-
Raskin J., Kremer S., "Game Analysis of Abuse-free Contract Signing", 15th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, pp. 206-220, June, 2002
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 206-220
-
-
Raskin, J.1
Kremer, S.2
-
36
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
Shmatikov V., Mitchell J. C., "Finite-state analysis of two contract signing protocols", Theoretical Computer Science, vol. 283, num. 2, pp. 419-450, 2002
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
|