-
2
-
-
24344461667
-
A programmer friendly modular definition of the semantics of java
-
In J. Alves-Foss, editor, Springer-Verlag, [BS99]
-
[BS99] E. Borger and W. Schulte. A programmer friendly modular definition of the semantics of java. In J. Alves-Foss, editor, Forma! Syntax and Semantics of Java, volume 1523 of Led. Notes in Comp. Sci., pages 353-404. Springer-Verlag, 1999.
-
(1999)
Forma! Syntax and Semantics of Java, volume 1523 of Led. Notes in Comp. Sci
, pp. 353-404
-
-
Borger, E.1
Schulte, W.2
-
8
-
-
14844343148
-
Design of a CIL connector to Maude
-
In N. Hcintze H. Vcith and E. Clarke, editors, Carnegie Mellon University, July [DenOO]
-
[DenOO] G. Denker. Design of a CIL connector to Maude. In N. Hcintze H. Vcith and E. Clarke, editors. Workshop on Format Methods and Comuter Security. Carnegie Mellon University, July 2000.
-
(2000)
Workshop on Format Methods and Comuter Security
-
-
Denker, G.1
-
11
-
-
84958777572
-
AGVI-Automatic Generation, Verification, and Implementation of Security Protocols
-
In, Springer-Verlag, [DXSP01]
-
[DXSP01] Adrian Perrig Dawn Xiaodong Song and Doantam Phan. AGVI-Automatic Generation, Verification, and Implementation of Security Protocols. In Proceedings of the 13th International Conference on Computer Aided Verification, pages 241-245. Springer-Verlag, 2001.
-
(2001)
Proceedings of the 13th International Conference on Computer Aided Verification
, pp. 241-245
-
-
Perrig, A.1
Song, D.X.2
Phan, D.3
-
14
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
In Deborah Cooper and Teresa Lunt, editors, IEEE Computer Society, [LGY90]
-
[LGY90] R. Needham L. Gong and R. Yahalom. Reasoning about belief in cryptographic protocols. In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, 1990.
-
(1990)
Proceedings 1990 IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Needham, L.1
Gong, R.2
Yahalom, R.3
-
15
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
[Low95]
-
[Low95] G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3): 131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
16
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
In, Springer-Verlag. Berlin Germany, [Low96]
-
[Low96] G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055. pages 147-166. Springer-Verlag. Berlin Germany, 1996.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
17
-
-
0348151887
-
A logic of authentication, from proceedings of the royal society, volume 426, number 1871, 1989
-
In, IEEE Computer Society Press, [MBN96]
-
[MBN96] M. Abadi M. Burrows and R. Needham. A logic of authentication, from proceedings of the royal society, volume 426, number 1871, 1989. In William Stallings, Practical Cryptography for Data Internetworks. IEEE Computer Society Press, 1996.
-
(1996)
William Stallings, Practical Cryptography for Data Internetworks
-
-
Abadi, M.1
Burrows, M.2
Needham, R.3
-
20
-
-
44049113210
-
A calculus of mobile processes, Parts I and II
-
[MPW92]
-
[MPW92] Robin Milner, Joachim Parrow, and David Walker. A calculus of mobile processes, Parts I and II. Journal of Information and Computation. 100(1): 1-40 and 41-77, 1992.
-
(1992)
Journal of Information and Computation
, vol.100
, Issue.1
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
21
-
-
21144445192
-
A logical encoding of the pi-calculus: Model checking mobile processes using tabled resolution
-
In, New York, NY, January Springer. [PYS03]
-
[PYS03] C. R. Ramakrishnan Ping Yang and Scott A. Smolka. A logical encoding of the pi-calculus: Model checking mobile processes using tabled resolution. In Verification, Model Checking and Abstract Interpretation (VMCAI), volume 2575 of Lecture Notes in Computer Science, pages 116-131, New York, NY, January 2003. Springer.
-
(2003)
Verification, Model Checking and Abstract Interpretation (VMCAI), volume 2575 of Lecture Notes in Computer Science
, pp. 116-131
-
-
Ping, R.1
Yang, C.R.2
Smolka, S.A.3
-
22
-
-
0003754739
-
-
SGS-THOMSON Microelectronics Limiled, [SGS95]
-
[SGS95] SGS-THOMSON Microelectronics Limiled. Occam 2. 1 reference manual. 1995.
-
(1995)
Occam 2. 1 reference manual
-
-
|