-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
September
-
M. Abadi. Secrecy by typing in security protocols. Journal of the ACM, 46(5):749-786, September 1999.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A.D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148:1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
84942246406
-
Automatic validation of protocol narration
-
In, IEEE Press
-
C. Bodei, M. Buchholtz, P. Degano, F. Nielson, and H. Riis Nielson. Automatic validation of protocol narration. In Proc. CSFÏV03, pages 126-140. IEEE Press, 2003.
-
(2003)
Proc. CSFÏV03
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Riis Nielson, H.5
-
8
-
-
0032671775
-
A meta-notation for protocol analysis
-
In
-
I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, and A. Scedrov. A meta-notation for protocol analysis. In Proc. IEEE Computer Security Foundations Workshop, pages 55-69, 1999.
-
(1999)
Proc. IEEE Computer Security Foundations Workshop
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.D.3
Mitchell, J.C.4
Scedrov, A.5
-
9
-
-
0033718532
-
TAPS: A first-order verifier for cryptographic protocols
-
In, IEEE Computer Society Press
-
E. Cohen. TAPS: A first-order verifier for cryptographic protocols. In 13th IEEE Computer Security Foundations Workshop, pages 144-158. IEEE Computer Society Press, 2000.
-
(2000)
13th IEEE Computer Security Foundations Workshop
, pp. 144-158
-
-
Cohen, E.1
-
12
-
-
0034835462
-
Authenticity by typing for security protocols
-
In, IEEE Computer Society Press
-
A.D. Gordon and A. Jeffrey. Authenticity by typing for security protocols. In Nth IEEE Computer Security Foundations Workshop, pages 145-159. IEEE Computer Society Press, 2001.
-
(2001)
Nth IEEE Computer Security Foundations Workshop
, pp. 145-159
-
-
Gordon, A.D.1
Jeffrey, A.2
-
13
-
-
84948759702
-
Types and effects for asymmetric cryptographic protocols
-
In, IEEE Computer Society Press
-
A.D. Gordon and A. Jeffrey. Types and effects for asymmetric cryptographic protocols. In 15th IEEE Computer Security Foundations Workshop, pages 77-91. IEEE Computer Society Press, 2002.
-
(2002)
15th IEEE Computer Security Foundations Workshop
, pp. 77-91
-
-
Gordon, A.D.1
Jeffrey, A.2
-
16
-
-
0033683607
-
Towards automatic verification of authentication protocols on an unbounded network
-
In, IEEE Computer Society Press
-
J. Heather and S. Schneider. Towards automatic verification of authentication protocols on an unbounded network. In 13th IEEE Computer Security Foundations Workshop, pages 132-143. IEEE Computer Society Press, 2000.
-
(2000)
13th IEEE Computer Security Foundations Workshop
, pp. 132-143
-
-
Heather, J.1
Schneider, S.2
-
18
-
-
0003735470
-
Model checking for security protocols
-
In, Preliminary version appears as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May 1997
-
W. Marrero, E.M. Clarke, and S. Jha. Model checking for security protocols. In D1MACS Workshop on Design and Formal Verification of Security Protocols, 1997. Preliminary version appears as Technical Report TR-CMU-CS-97-139, Carnegie Mellon University, May 1997.
-
(1997)
D1MACS Workshop on Design and Formal Verification of Security Protocols
-
-
Marrero, W.1
Clarke, E.M.2
Jha, S.3
-
19
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
20
-
-
0029484376
-
Modelling and verifying key-exchange protocols using CSP and FDR
-
In, IEEE Computer Society Press
-
A.W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR. In 8th IEEE Computer Security Foundations Workshop, pages 98-107. IEEE Computer Society Press, 1995.
-
(1995)
8th IEEE Computer Security Foundations Workshop
, pp. 98-107
-
-
Roscoe, A.W.1
|