-
1
-
-
0002652530
-
Security protocols and their properties
-
In: Bauer FL, Steinbrueggen R (eds). IOS Press, Amsterdam
-
Abadi M (2000) Security protocols and their properties. In: Bauer FL, Steinbrueggen R (eds) Foundations of secure computation, 20th Int. Summer School, Marktoberdorf, Germany, pp 39-60. IOS Press, Amsterdam
-
(2000)
Foundations of Secure Computation, 20th Int. Summer School, Marktoberdorf, Germany
, pp. 39-60
-
-
Abadi, M.1
-
2
-
-
0001794268
-
Semantics of interaction: An introduction to game semantics
-
In: Dybjer P, Pitts A (eds), Isaac Newton Institute. Cambridge University Press, Cambridge
-
Abramsky S (1997) Semantics of interaction: an introduction to game semantics. In: Dybjer P, Pitts A (eds) Proceedings of the 1996 CLiCS Summer School, Isaac Newton Institute. Cambridge University Press, Cambridge
-
(1997)
Proceedings of the 1996 CLiCS Summer School
-
-
Abramsky, S.1
-
4
-
-
0037421015
-
A new logic for electronic commerce protocols
-
Adi K, Debbabi M, Mejri M (2003) A new logic for electronic commerce protocols. Theor Comput Sci 291(3):223-283
-
(2003)
Theor Comput Sci
, vol.291
, Issue.3
, pp. 223-283
-
-
Adi, K.1
Debbabi, M.2
Mejri, M.3
-
5
-
-
17644411480
-
Mobile values, new names, and secure communication
-
Abadi M, Fournet C (2001) Mobile values, new names, and secure communication. In: POPL, pp 104-115
-
(2001)
POPL
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
9
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundeness of formal encryption)
-
Abadi M, Rogaway P (2002) Reconciling two views of cryptography (The computational soundeness of formal encryption). J Cryptol 15(2):103-127
-
(2002)
J Cryptol
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
10
-
-
26844508455
-
Automated verification of selected equivalences for security protocols
-
IEEE Computer Society, New York
-
Blanchet B, Abadi M, Fournet C (2005) Automated verification of selected equivalences for security protocols. In: LICS, pp 331-340. IEEE Computer Society, New York
-
(2005)
LICS
, pp. 331-340
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
13
-
-
0001618306
-
A game semantics for linear logic
-
Blass A (1992) A game semantics for linear logic. Ann Pure Appl Logic 56:183-220
-
(1992)
Ann Pure Appl Logic
, vol.56
, pp. 183-220
-
-
Blass, A.1
-
14
-
-
0032671775
-
A meta-notation for protocol analysis
-
IEEE Computer Society Press, New York
-
Cervesato I, Durgin N, Lincoln P, Mitchell J, Scedrov A (1999) A meta-notation for protocol analysis. In: CSFW: Proceedings of The 12th Computer Security Foundations Workshop. IEEE Computer Society Press, New York
-
(1999)
CSFW: Proceedings of the 12th Computer Security Foundations Workshop
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
15
-
-
0003257683
-
Using state space exploration and a natural deduction style message derivation engine to verify security protocols
-
Clarke E, Jha S, MarreroW (1998) Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In: International Conference on Programming Concepts and Methods, pp 87-106
-
(1998)
International Conference on Programming Concepts and Methods
, pp. 87-106
-
-
Clarke, E.1
Jha, S.2
Marrero, W.3
-
16
-
-
33750194652
-
Formal analysis of multiparty contract signing
-
Chadha R, kremer S, Scedrov A (2006) Formal analysis of multiparty contract signing. J Autom Reason 36:39-83
-
(2006)
J Autom Reason
, vol.36
, pp. 39-83
-
-
Chadha, R.1
Kremer, S.2
Scedrov, A.3
-
17
-
-
0025494721
-
Tableau-based model checking in the propositional mu-calculus
-
Cleaveland R (1990) Tableau-based model checking in the propositional mu-calculus. Acta Inform 27(8):725-748
-
(1990)
Acta Inform
, vol.27
, Issue.8
, pp. 725-748
-
-
Cleaveland, R.1
-
19
-
-
0020720357
-
On the security of public key protocols
-
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inform Theory 29(2):198-208
-
(1983)
IEEE Trans Inform Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
20
-
-
0034672932
-
On full abstraction for PCF: I, II, III
-
Hyland JME, Ong C-HL (2000) On full abstraction for PCF: I, II, III. Info Comp 163:285-408
-
(2000)
Info Comp
, vol.163
, pp. 285-408
-
-
Hyland, J.M.E.1
Ong, C.-H.L.2
-
21
-
-
46749146096
-
Games in the semantics of programming languages
-
October/November 2002
-
Jurjens J (2002) Games in the semantics of programming languages. Synthese (Elsevier) 133(1-2), October/November 2002
-
(2002)
Synthese (Elsevier)
, vol.133
, Issue.1-2
-
-
Jurjens, J.1
-
23
-
-
84937345304
-
Basic objectives of dialogue logic in historical perspective
-
April/May
-
Lorenz K (2001) Basic objectives of dialogue logic in historical perspective. Synthese (Elsevier), 127(1-2), April/May
-
(2001)
Synthese (Elsevier)
, vol.127
, Issue.1-2
-
-
Lorenz, K.1
-
24
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Lowe G (1996) Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software-concepts and tools 17(3):93-102
-
(1996)
Software-concepts and Tools
, vol.17
, Issue.3
, pp. 93-102
-
-
Lowe, G.1
-
25
-
-
0030708255
-
A hierarchy of authentication specification
-
IEEE Computer Society, New York
-
Lowe G (1997) A hierarchy of authentication specification. In: CSFW, pp 31-44. IEEE Computer Society, New York
-
(1997)
CSFW
, pp. 31-44
-
-
Lowe, G.1
-
26
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R, SchroederM(1978) Using encryption for authentication in large networks of computers. Commun ACM21(12)
-
(1978)
Commun ACM
, vol.21
, Issue.12
-
-
Needham, R.1
Schroeder, M.2
-
27
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
1998
-
Paulson LC (1998) The inductive approach to verifying cryptographic protocols. J Comp Secur 85-128 (1998)
-
(1998)
J Comp Secur
, pp. 85-128
-
-
Paulson, L.C.1
-
30
-
-
0141631479
-
Computable functions and semicomputable sets on many-sorted algebras
-
In: Abramsky S,Gabbay D, Maibaum T, (eds). Oxford University Press, Oxford
-
Tucker JV, Zucker JI (2000) Computable functions and semicomputable sets on many-sorted algebras. In: Abramsky S,Gabbay D, Maibaum T, (eds) Handbook of logic in computer science, vol 5, pp 317-523. Oxford University Press, Oxford
-
(2000)
Handbook of Logic in Computer Science
, vol.5
, pp. 317-523
-
-
Tucker, J.V.1
Zucker, J.I.2
-
31
-
-
0002508587
-
A lesson on authentication protocol design
-
Woo TYC, Lam SS (1994) A lesson on authentication protocol design. Oper Syst Rev 24-37
-
(1994)
Oper Syst Rev
, pp. 24-37
-
-
Woo, T.Y.C.1
Lam, S.S.2
|