-
1
-
-
19744367735
-
OFMC: A Symbolic Model Checker for Security Protocols
-
D. Basin, S. Mödersheim, and L. Viganò, "OFMC: A Symbolic Model Checker for Security Protocols," Int'l J. Information Security, vol. 4, no. 3, 2005, pp. 181-208.
-
(2005)
Int'l J. Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
2
-
-
48949088211
-
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
-
Proc. 20th Int'l Conf. Computer Aided Verification
-
C. Cremers, "The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols," Proc. 20th Int'l Conf. Computer Aided Verification, LNCS 5123, 2008, pp. 414-418; www.cs.ox.ac.uk/people/cas.cremers/scyther.
-
(2008)
LNCS 5123
, pp. 414-418
-
-
Cremers, C.1
-
3
-
-
84874349098
-
Efficient Construction of Machine-Checked Symbolic Protocol Security Proofs
-
S. Meier, C. Cremers, and D. Basin, "Efficient Construction of Machine-Checked Symbolic Protocol Security Proofs," J. Computer Security, vol. 21, no. 1, 2013, pp. 41-87.
-
(2013)
J. Computer Security
, vol.21
, Issue.1
, pp. 41-87
-
-
Meier, S.1
Cremers, C.2
Basin, D.3
-
5
-
-
3042685819
-
Overview of IEEE 802.16 Security
-
D. Johnston and J. Walker, "Overview of IEEE 802.16 Security," IEEE Security & Privacy, vol. 2, no. 3, 2004, pp. 40-48.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 40-48
-
-
Johnston, D.1
Walker, J.2
-
8
-
-
40149109757
-
A Framework for Compositional Verification of Security Protocols
-
S. Andova et al., "A Framework for Compositional Verification of Security Protocols," Information and Computation, Feb. 2008, pp. 425-459.
-
(2008)
Information and Computation
, Issue.FEB
, pp. 425-459
-
-
Andova, S.1
-
9
-
-
0020720357
-
On the Security of Public Key Protocols
-
D. Dolev and A. Yao, "On the Security of Public Key Protocols," IEEE Trans. Information Theory, vol. 29, no. 2, 1983, pp. 198-208.
-
(1983)
IEEE Trans. Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
11
-
-
84859302632
-
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication
-
Proc. 1st Int'l Conf. Principles of Security and Trust (POST 12) P. Degano and J.D. Guttman, eds.
-
D. Basin, C. Cremers, and S. Meier, "Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication," Proc. 1st Int'l Conf. Principles of Security and Trust (POST 12), LNCS 7215, P. Degano and J.D. Guttman, eds., 2012, pp. 129-148.
-
(2012)
LNCS 7215
, pp. 129-148
-
-
Basin, D.1
Cremers, C.2
Meier, S.3
-
12
-
-
84940106630
-
Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer
-
C. Meadows, "Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer," Proc. IEEE Symp. Security and Privacy, 1999, pp. 216-231.
-
Proc. IEEE Symp. Security and Privacy, 1999
, pp. 216-231
-
-
Meadows, C.1
-
13
-
-
27844540827
-
Formal Specification and Analysis of the Group Domain of Interpretation Protocol Using NPATRL and the NRL Protocol Analyzer
-
C. Meadows, P.F. Syverson, and I. Cervesato, "Formal Specification and Analysis of the Group Domain of Interpretation Protocol Using NPATRL and the NRL Protocol Analyzer," J. Computer Security, vol. 12, no. 6, 2004, pp. 893-931.
-
(2004)
J. Computer Security
, vol.12
, Issue.6
, pp. 893-931
-
-
Meadows, C.1
Syverson, P.F.2
Cervesato, I.3
-
14
-
-
77956148457
-
How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTREC
-
Proc. 14th Int'l Conf. Financial Cryptography and Data Security
-
S. Matsuo et al., "How to Evaluate the Security of Real-Life Cryptographic Protocols? The Cases of ISO/IEC 29128 and CRYPTREC," Proc. 14th Int'l Conf. Financial Cryptography and Data Security, LNCS 6054, 2010, pp. 182-194.
-
(2010)
LNCS 6054
, pp. 182-194
-
-
Matsuo, S.1
-
17
-
-
84881193419
-
The TAMARIN Prover for the Symbolic Analysis of Security Protocols
-
Proc. 25th Int'l Conf. Computer Aided Verification (CAV 13) 696-701
-
S. Meier et al., "The TAMARIN Prover for the Symbolic Analysis of Security Protocols," Proc. 25th Int'l Conf. Computer Aided Verification (CAV 13), LNCS 8044, 2013, pp. 696-701.
-
(2013)
LNCS 8044
-
-
Meier, S.1
|