-
1
-
-
0027678308
-
Authentication and delegation with smart-cards
-
M. Abadi, M. Burrows, C. Kaufman, and B. Lampson. Authentication and delegation with smart-cards. Science of Computer Programming, 21(2):93-113, 1993.
-
(1993)
Science of Computer Programming
, vol.21
, Issue.2
, pp. 93-113
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
2
-
-
0028532579
-
Why cryptosystems fail
-
November
-
R. Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):32-40, November 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 32-40
-
-
Anderson, R.1
-
5
-
-
23044520204
-
The state of the art in electronic payment systems
-
N. Asokan, P. Janson, M. Steiner, and M. Waidner. The state of the art in electronic payment systems. Advances in Computers, 53, 2000.
-
(2000)
Advances In Computers
, pp. 53
-
-
Asokan, N.1
Janson, P.2
Steiner, M.3
Waidner, M.4
-
7
-
-
0007010376
-
-
Technische Universität München
-
M. Broy, F. Dederich, C. Dendorfer, M. Fuchs, T. Gritzner, and R. Weber. The design of distributed systems - an introduction to FOCUS. Technical Report TUM-I9202, Technische Universität München, 1992.
-
(1992)
The Design of Distributed Systems - An Introduction to FOCUS. Technical Report TUM-I9202
-
-
Broy, M.1
Dederich, F.2
Dendorfer, C.3
Fuchs, M.4
Gritzner, T.5
Weber, R.6
-
8
-
-
23144452315
-
-
CEPSCO, Business Requirements vers. 7.0, Functional Requirements vers. 6.3, Technical Specification vers.2.2, available from
-
CEPSCO. Common Electronic Purse Specifications, 2000. Business Requirements vers. 7.0, Functional Requirements vers. 6.3, Technical Specification vers.2.2, available from http://www.cepsco.com.
-
Common Electronic Purse Specifications, 2000
-
-
-
12
-
-
19144370194
-
On the verification of cryptographic protocols - a tale of two committees
-
volume 32 of Electronical Notes in Theoretical Computer Science
-
D. Gollmann. On the verification of cryptographic protocols - a tale of two committees. In Workshop on Security Architectures and Information Flow, volume 32 of Electronical Notes in Theoretical Computer Science, 2000.
-
(2000)
Workshop On Security Architectures and Information Flow
-
-
Gollmann, D.1
-
13
-
-
0032623470
-
Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification
-
Stefanos Gritzalis, Diomidis Spinellis, and Panagiotis Georgiadis. Security protocols over open networks and distributed systems: Formal methods for their analysis, design, and verification. Computer Communications, 22(8):695-707, 1999.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 695-707
-
-
Gritzalis, S.1
Spinellis, D.2
Georgiadis, P.3
-
14
-
-
0003422822
-
Tool supported Specification and Simulation of Distributed Systems
-
F. Huber, S. Molterer, A. Rausch, B. Schätz, M. Sihling, and O. Slotosch. Tool supported Specification and Simulation of Distributed Systems. In International Symposium on Software Engineering for Parallel and Distributed Systems, pages 155-164, 1998.
-
(1998)
In International Symposium On Software Engineering For Parallel and Distributed Systems
, pp. 155-164
-
-
Huber, F.1
Molterer, S.2
Rausch, A.3
Schätz, B.4
Sihling, M.5
Slotosch, O.6
-
15
-
-
77950064308
-
Traffic Lights - An AUTOFOCUS Case Study
-
IEEE Computer Society
-
F. Huber, S. Molterer, B. Schätz, O. Slotosch, and A. Vilbig. Traffic Lights - An AUTOFOCUS Case Study. In 1998 International Conference on Application of Concurrency to System Design, pages 282-294. IEEE Computer Society, 1998.
-
(1998)
In 1998 International Conference On Application of Concurrency to System Design
, pp. 282-294
-
-
Huber, F.1
Molterer, S.2
Schätz, B.3
Slotosch, O.4
Vilbig, A.5
-
19
-
-
84944220091
-
-
In H. Hußmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS, International Conference), LNCS. Springer
-
Jan Jürjens. Towards development of secure systems using UML. In H. Hußmann, editor, Fundamental Approaches to Software Engineering (FASE/ETAPS, International Conference), LNCS. Springer, 2001c.
-
(2001)
Towards Development of Secure Systems Using UML
-
-
Jürjens, J.1
-
22
-
-
0031335394
-
Threat scenarios as a means to formally develop secure systems
-
V. Lotz. Threat scenarios as a means to formally develop secure systems. Journal of Computer Security 5, pages 31-67, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, pp. 31-67
-
-
Lotz, V.1
-
24
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
26
-
-
0034823388
-
A model for asynchronous reactive systems and its applications to secure message transmissions
-
Birgit Pfitzmann and Michael Waidner. A model for asynchronous reactive systems and its applications to secure message transmissions. In IEEE Symposium on Security and Privacy, 2001.
-
(2001)
IEEE Symposium On Security and Privacy
-
-
Pfitzmann, B.1
Waidner, M.2
-
27
-
-
84904215216
-
-
Addison Wesley
-
P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. Analysis and Design of Security Protocols. Addison Wesley, 2001.
-
(2001)
Analysis and Design of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
28
-
-
0043024883
-
-
Oxford University Computing Laboratory, Technical Monograph PRG-126
-
S. Stepney, D. Cooper, and J. Woodcock. An Electronic Purse: Specification, Refinement, and Proof. Oxford University Computing Laboratory, 2000. Technical Monograph PRG-126.
-
(2000)
An Electronic Purse: Specification, Refinement, and Proof
-
-
Stepney, S.1
Cooper, D.2
Woodcock, J.3
-
29
-
-
84904171659
-
-
In D.Hutter, W.Stephan, PTraverso, and M.Ullmann, editors, Applied Formal Methods - FM-Trends 98, Springer LNCS 1641
-
O. Slotosch. Quest: Overview over the Project. In D.Hutter, W.Stephan, PTraverso, and M.Ullmann, editors, Applied Formal Methods - FM-Trends 98, pages 346-350. Springer LNCS 1641, 1998.
-
(1998)
Quest: Overview Over the Project
, pp. 346-350
-
-
Slotosch, O.1
-
30
-
-
1642503732
-
Specification Based Test Sequence Generation with Propositional Logic
-
G. Wimmel, H. Lötzbeyer, A. Pretschner, and O. Slotosch. Specification Based Test Sequence Generation with Propositional Logic. Journal on Software Testing Verfication and Reliability, 10, 2000.
-
(2000)
Journal On Software Testing Verfication and Reliability
, pp. 10
-
-
Wimmel, G.1
Lötzbeyer, H.2
Pretschner, A.3
Slotosch, O.4
|