-
1
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
Abadi, M., Blanchet, B.: Analyzing security protocols with secrecy types and logic programs. Journal of the ACM (JACM) 52(1), 102-146 (2005)
-
(2005)
Journal of the ACM (JACM)
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
17644411480
-
Mobile values, new names, and secure communication
-
ACM
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 104-115. ACM (2001)
-
(2001)
Proceedings of the 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
77957587422
-
Towards a formal foundation of web security
-
IEEE
-
Akhawe, D., Barth, A., Lam, P., Mitchell, J., Song, D.: Towards a formal foundation of web security. In: Proceedings of 23rd IEEE Computer Security Foundations Symposium, pp. 290-304. IEEE (2010)
-
(2010)
Proceedings of 23rd IEEE Computer Security Foundations Symposium
, pp. 290-304
-
-
Akhawe, D.1
Barth, A.2
Lam, P.3
Mitchell, J.4
Song, D.5
-
5
-
-
70349233792
-
Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based single sign-on for Google Apps
-
ACM
-
Armando, A., Carbone, R., Compagna, L., Cuellar, J., Tobarra, L.: Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based single sign-on for Google Apps. In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, pp. 1-10. ACM (2008)
-
(2008)
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuellar, J.4
Tobarra, L.5
-
6
-
-
22944445210
-
SATMC: A SAT-based model checker for security protocols
-
Logics in Artificial Intelligence - 9th European Conference, JELIA 2004
-
Armando, A., Compagna, L.: SATMC: A SAT-based model checker for security protocols. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS (LNAI), vol. 3229, pp. 730-733. Springer, Heidelberg (2004) (Pubitemid 41049985)
-
(2004)
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
, vol.3229
, pp. 730-733
-
-
Armando, A.1
Compagna, L.2
-
7
-
-
84866927100
-
Discovering concrete attacks on website authorization by formal analysis
-
IEEE
-
Bansal, C., Bhargavan, K., Maffeis, S.: Discovering concrete attacks on website authorization by formal analysis. In: 2012 IEEE 25th Computer Security Foundations Symposium (CSF), pp. 247-262. IEEE (2012)
-
(2012)
2012 IEEE 25th Computer Security Foundations Symposium (CSF)
, pp. 247-262
-
-
Bansal, C.1
Bhargavan, K.2
Maffeis, S.3
-
8
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363-434 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
10
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1), 3-51 (2008)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
12
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18-36 (1990)
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
13
-
-
44949218700
-
-
OASIS Standard March
-
Cantor, S., Kemp, I., Philpott, N., Maler, E.: Assertions and protocols for the OASIS Security Assertion Markup Language V2.0. OASIS Standard (March 2005)
-
(2005)
Assertions and Protocols for the OASIS Security Assertion Markup Language V2.0
-
-
Cantor, S.1
Kemp, I.2
Philpott, N.3
Maler, E.4
-
14
-
-
0032671775
-
A metanotation for protocol analysis
-
IEEE
-
Cervesato, I., Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: A metanotation for protocol analysis. In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999, pp. 55-69. IEEE (1999)
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.3
Mitchell, J.C.4
Scedrov, A.5
-
16
-
-
67650240831
-
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
-
ACM
-
Cremers, C.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 119-128. ACM (2008)
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 119-128
-
-
Cremers, C.1
-
17
-
-
67650233415
-
Comparing state spaces in automatic security protocol analysis
-
Cortier, V., Kirchner, C., Okada, M., Sakurada, H. (eds.) Formal to Practical Security. Springer, Heidelberg
-
Cremers, C.J.F., Lafourcade, P., Nadeau, P.: Comparing state spaces in automatic security protocol analysis. In: Cortier, V., Kirchner, C., Okada, M., Sakurada, H. (eds.) Formal to Practical Security. LNCS, vol. 5458, pp. 70-94. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5458
, pp. 70-94
-
-
Cremers, C.J.F.1
Lafourcade, P.2
Nadeau, P.3
-
19
-
-
0042500424
-
Undecidability of bounded security protocols
-
Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Undecidability of bounded security protocols. In: Proceedings of the Workshop on Formal Methods and Security Protocols (1999)
-
Proceedings of the Workshop on Formal Methods and Security Protocols (1999)
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
20
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
IEEE
-
Fábrega, F., Herzog, J., Guttman, J.: Strand spaces: Why is a security protocol correct? In: Proceedings of 1998 IEEE Symposium on Research in Security and Privacy, pp. 160-171. IEEE (1998)
-
(1998)
Proceedings of 1998 IEEE Symposium on Research in Security and Privacy
, pp. 160-171
-
-
Fábrega, F.1
Herzog, J.2
Guttman, J.3
-
21
-
-
80052123982
-
-
tools.ietf.org/html/ietf-oauth-v2-31
-
Hammer-Lahav, E., Recordon, D., Hardt, D.: The OAuth 2.0 authorization protocol. tools.ietf.org/html/ietf-oauth-v2-31, 8 (2011)
-
(2011)
The OAuth 2.0 Authorization Protocol
, pp. 8
-
-
Hammer-Lahav, E.1
Recordon, D.2
Hardt, D.3
-
24
-
-
82055189997
-
Model driven security analysis of IDaaS protocols
-
Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. Springer, Heidelberg
-
Kumar, A.: Model driven security analysis of IDaaS protocols. In: Kappel, G., Maamar, Z., Motahari-Nezhad, H.R. (eds.) ICSOC 2011. LNCS, vol. 7084, pp. 312-327. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7084
, pp. 312-327
-
-
Kumar, A.1
-
26
-
-
0025405980
-
A critique of the Burrows, Abadi and Needham logic
-
Nessett, D.: A critique of the Burrows, Abadi and Needham logic. ACM SIGOPS Operating Systems Review 24(2), 35-38 (1990)
-
(1990)
ACM SIGOPS Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.1
-
28
-
-
84957071248
-
Automatic verification of cryptographic protocols with SETHEO
-
McCune, W. (ed.) CADE 1997. Springer, Heidelberg
-
Schumann, J.: Automatic verification of cryptographic protocols with SETHEO. In: McCune, W. (ed.) CADE 1997. LNCS, vol. 1249, pp. 87-100. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1249
, pp. 87-100
-
-
Schumann, J.1
-
29
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
Song, D., Berezin, S., Perrig, A.: Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security 9(1/2), 47-74 (2001)
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
|