-
1
-
-
0025386404
-
A logic of authentication
-
February
-
Michael Burrows, Martin Abadi, and Roger Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(l):18-36, February 1990.
-
(1990)
ACM Transactions On Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
2
-
-
0033698744
-
Relating strands and multiset rewriting for security protocol analysis
-
In Paul Syverson, editor, IEEE Press
-
Iliano Cervesato, Nancy Durgin, Patrick Lincoln, John Mitchell, and Andre Sce-drov. Relating strands and multiset rewriting for security protocol analysis. In Paul Syverson, editor, Proc. 13th IEEE Computer Security Foundations Workshop, pages 35-51. IEEE Press, 2000.
-
(2000)
Proc. 13th IEEE Computer Security Foundations Workshop
, pp. 35-51
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Sce-Drov, A.5
-
5
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
Leslie Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558-564, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-564
-
-
Lamport, L.1
-
6
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
of Lecture Notes in Computer Science, Springer
-
Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proc. Workshop on Tools and Algorithms for The Construction and Analysis of Systems (TACAS), volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer, 1996.
-
(1996)
Proc. Workshop On Tools and Algorithms For the Construction and Analysis of Systems (TACAS)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
7
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Gavin Lowe. Towards a completeness result for model checking of security protocols. The Journal of Computer Security, 7(2/3):89-146, 1999.
-
(1999)
The Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 89-146
-
-
Lowe, G.1
-
8
-
-
0023247970
-
Efficient and timely mutual authentication
-
January
-
Dave Otway and Owen Rees. Efficient and timely mutual authentication. Operating Systems Review, 21(1):8-10, January 1987.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
9
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. The Journal of Computer Security, 6(l/2):85-128, 1996.
-
(1996)
The Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
10
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
A. W. Roscoe and P. J. Broadfoot. Proving security protocols with model checkers by data independence techniques. The Journal of Computer Security, 7(2/3), 1999.
-
(1999)
The Journal of Computer Security
, vol.7
, Issue.2-3
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
-
11
-
-
0004021264
-
-
Technical Report, Computer Science Dept., Indiana University, July, Revised April 2001, Also available at
-
Scott D. Stoller. A bound on attacks on authentication protocols. Technical Report 526, Computer Science Dept., Indiana University, July 1999. Revised April 2001. Also available at www.cs.sunysb.edu/~stoller/TR526.html.
-
(1999)
A Bound On Attacks On Authentication Protocols
, vol.526
-
-
Stoller, S.D.1
|