-
1
-
-
0000523051
-
A Logic of Authentication
-
Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. Proceedings of the Royal Society of London A, Vol. 426 (1989) 233-271
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
3
-
-
85159695785
-
Fault-Preserving Simplifying Transformations for Security Protocols
-
Hui, M., Lowe, G.: Fault-Preserving Simplifying Transformations for Security Protocols. Submitted for publication (2000)
-
(2000)
Submitted for Publication
-
-
Hui, M.1
Lowe, G.2
-
4
-
-
0038186894
-
A semantic study of data-independence with applications to the mechanical verification of concurrent systems
-
Lazić, R.S.: A semantic study of data-independence with applications to the mechanical verification of concurrent systems. Oxford University D.Phil thesis (1998)
-
(1998)
Oxford University D.Phil Thesis
-
-
Lazić, R.S.1
-
5
-
-
85159673823
-
Using logical relations for automated verification of data-independent CSP. Proceedings of the Workshop on Automated Formal Methods (Oxford, U.K.)
-
Lazić, R.S., Roscoe, A.W.: Using logical relations for automated verification of data-independent CSP. Proceedings of the Workshop on Automated Formal Methods (Oxford, U.K.). Electronic Notes in Theoretical Computer Science 5 (1997)
-
(1997)
Electronic Notes in Theoretical Computer Science
, vol.5
-
-
Lazić, R.S.1
Roscoe, A.W.2
-
6
-
-
85159695809
-
Verifying determinism of data-independent systems with labellings, arrays and constants
-
Lazić, R.S., Roscoe, A.W.: Verifying determinism of data-independent systems with labellings, arrays and constants. Proceedings of INFINITY (1998)
-
(1998)
Proceedings of INFINITY
-
-
Lazić, R.S.1
Roscoe, A.W.2
-
8
-
-
28144456308
-
An Attack on the Needham-Schroeder Public-Key Authentication Protocol
-
Lowe, G.: An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Information Processing Letters, Vol. 56 (1995) 131-133
-
(1995)
Information Processing Letters
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
9
-
-
0003130993
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Springer LNCS
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Proceedings of TACAS '97. Springer LNCS 1055 (1996)
-
(1996)
Proceedings of TACAS '97
, pp. 1055
-
-
Lowe, G.1
-
15
-
-
84864111084
-
The theory and practice of concurrency
-
Roscoe, A.W.: The theory and practice of concurrency. Prentice Hall (1998)
-
(1998)
Prentice Hall
-
-
Roscoe, A.W.1
-
17
-
-
0033344294
-
Proving security protocols with model checkers by data independence techniques
-
Special Issue CSFW11
-
Roscoe, A.W., Broadfoot, P.J.: Proving security protocols with model checkers by data independence techniques. Journal of Computer Security. Special Issue CSFW11 (1999) 147-190
-
(1999)
Journal of Computer Security
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
|