-
1
-
-
4243352588
-
-
Research Report 460, University of Cambridge - Computer Laboratory
-
G. Bella. Message reception in the inductive approach. Research Report 460, University of Cambridge - Computer Laboratory, 1999.
-
(1999)
Message Reception in the Inductive Approach
-
-
Bella, G.1
-
3
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
of Lecture Notes in Comp. Sci, Springer-Verlag
-
G. Bella and L. C. Paulson. Kerberos version IV: Inductive analysis of the secrecy goals. In Proc. of the 5th Eur. Sym. on Res. in Comp. Sec., volume 1485 of Lecture Notes in Comp. Sci., pages 361-375. Springer-Verlag, 1998.
-
(1998)
Proc of the 5Th Eur Sym on Res in Comp Sec
, vol.1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
4
-
-
85159707864
-
-
S. Brackin. Automatic formal analyses of two large commercial protocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997. Available on the web at http://www.arca.com/proj papers/brackin/dimacs.pdf.
-
-
-
Brackin, S.1
-
5
-
-
85159711501
-
-
S. Brackin. Automatically detecting authentication limitations in commercial security protocols. In Proceedings of the 22nd National Conference on Information Systems Security, October 1999. Available on the web at http://www.arca.com/proj papers/brackin/Nissc99.pdf.
-
-
-
Brackin, S.1
-
7
-
-
0029210095
-
Reasoning about accountability in protocols for electronic commerce
-
IEEE Comp. Society Press
-
R. Kailar. Reasoning about accountability in protocols for electronic commerce. In Proc. of the 14th IEEE Sym. on Sec. and Privacy, pages 236-250. IEEE Comp. Society Press, 1995.
-
(1995)
Proc of the 14Th IEEE Sym on Sec and Privacy
, pp. 236-250
-
-
Kailar, R.1
-
8
-
-
84958771467
-
A sound logic for analysing electronic commerce protocols
-
J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, ofLecture Notes in Comp. Sci. Springer-Verlag
-
V. Kessler and H. Neumann. A sound logic for analysing electronic commerce protocols. In J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Proc. of the 5th Eur. Sym. on Res. in Comp. Sec., volume 1485 of Lecture Notes in Comp. Sci. Springer-Verlag, 1998.
-
(1998)
Proc of the 5Th Eur Sym on Res in Comp Sec
, vol.1485
-
-
Kessler, V.1
Neumann, H.2
-
10
-
-
0030708255
-
A hierarchy of authentication specifications
-
IEEE Comp. Society Press
-
G. Lowe. A hierarchy of authentication specifications. In Proc. of the 10th IEEE Comp. Sec. Found. Workshop, pages 31-43. IEEE Comp. Society Press, 1997.
-
(1997)
Proc of the 10Th IEEE Comp Sec Found Workshop
, pp. 31-43
-
-
Lowe, G.1
-
14
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Comp. Society Press
-
C. Meadows. Open issues in formal methods for cryptographic protocol analysis. In Proceedings of DISCEX 2000, pages 237-250. IEEE Comp. Society Press, 2000.
-
(2000)
Proceedings of DISCEX 2000
, pp. 237-250
-
-
Meadows, C.1
-
15
-
-
84958035071
-
A formal specification of requirements for payment transactions in the SET protocol
-
R. Hirschfeld, editor, ofLecture Notes in Comp. Sci. Springer-Verlag
-
C. Meadows and P. Syverson. A formal specification of requirements for payment transactions in the SET protocol. In R. Hirschfeld, editor, Proceedings of Financial Cryptography 98, volume 1465 of Lecture Notes in Comp. Sci. Springer-Verlag, 1998.
-
(1998)
Proceedings of Financial Cryptography 98
, vol.1465
-
-
Meadows, C.1
Syverson, P.2
-
16
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Comm. of the ACM, 21(12):993-999, 1978.
-
(1978)
Comm of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.2
-
18
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. J. of Comp. Sec., 6:85-128, 1998.
-
(1998)
J of Comp Sec
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
19
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
L. C. Paulson. Inductive analysis of the internet protocol TLS. ACM Trans. On Inform. and Sys. Sec., 2(3):332-351, 1999.
-
(1999)
ACM Trans on Inform and Sys Sec
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
20
-
-
84904250592
-
-
RSA Laboratories, Available electronically at
-
RSA Laboratories. PKCS-6: Extended-Certificate Syntax Standard, 1993. Available electronically at http://www.rsasecurity.com/rsalabs/pkcs.
-
(1993)
PKCS-6: Extended-Certificate Syntax Standard
-
-
-
21
-
-
0037615406
-
-
RSA Laboratories, Available electronically at
-
RSA Laboratories. PKCS-7: Cryptographic Message Syntax Standard, 1993. Available electronically at http://www.rsasecurity.com/rsalabs/pkcs.
-
(1993)
PKCS-7: Cryptographic Message Syntax Standard
-
-
-
22
-
-
0000937825
-
Verifying authentication protocols in CSP
-
S. Schneider. Verifying authentication protocols in CSP. IEEE Trans. On Software Engineering, 24(9):741-758, 1998.
-
(1998)
IEEE Trans on Software Engineering
, vol.24
, Issue.9
, pp. 741-758
-
-
Schneider, S.1
|