-
1
-
-
0001772130
-
Secrecy by Typing in Security Protocols
-
M. Abadi. Secrecy by Typing in Security Protocols. Journal of the ACM, 46(5): 749–786, 1999. 271
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
4
-
-
0008513874
-
Fundamental results for the verification of observational equivalence: A survey
-
In H. Rudin and C. H. West, editors, North-Holland
-
T. Bolognesi and S. A. Smolka. Fundamental results for the verification of observational equivalence: A survey. In H. Rudin and C. H. West, editors, Prooc. of Int’l Conference on Protocol Specification, Testing and Verification (PSTV’87), pages 165–179. North-Holland, 1987. 280
-
(1987)
Prooc. Of Int’l Conference on Protocol Specification, Testing and Verification (PSTV’87)
, pp. 165-179
-
-
Bolognesi, T.1
Smolka, S.A.2
-
6
-
-
0001439194
-
The Compositional Security Checker: A Tool for the Verification if Information Flow Security Properties
-
R. Focardi and R. Gorrieri. The Compositional Security Checker: A Tool for the Verification if Information Flow Security Properties. IEEE Transactions on Software Engineering, 23(9): 550–571, 1997. 276, 277
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
, pp. 550-571
-
-
Focardi, R.1
Gorrieri, R.2
-
7
-
-
84988393004
-
Classification of Security Properties (Part I: Information Flow)
-
In R. Focardi and R. Gorrieri, editors, of LNCS. Springer
-
R. Focardi and R. Gorrieri. Classification of Security Properties (Part I: Information Flow). In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, volume 2171 of LNCS. Springer, 2001. 271, 272, 273, 275, 276, 277, 279, 280, 283
-
(2001)
Foundations of Security Analysis and Design
, vol.2171
-
-
Focardi, R.1
Gorrieri, R.2
-
9
-
-
84876687849
-
Proof methods for bisimulation based information flow security
-
In A. Cortesi, editor, Springer
-
R. Focardi, C. Piazza, and S. Rossi. Proof methods for bisimulation based information flow security. In A. Cortesi, editor, Proc. of Int. Workshop on Verification, Model Checking and Abstract Interpretation, LNCS. Springer, 2002. 272
-
(2002)
Proc. Of Int. Workshop on Verification, Model Checking and Abstract Interpretation, LNCS
-
-
Focardi, R.1
Piazza, C.2
Rossi, S.3
-
15
-
-
0028058408
-
A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions
-
IEEE Computer Society Press
-
J. McLean. “A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions”. In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, 1994. 271
-
(1994)
In Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy
-
-
McLean, J.1
-
17
-
-
0030705795
-
Proving Properties of Security Protocols by Induction
-
IEEE Computer Society Press
-
L. C. Paulson. Proving Properties of Security Protocols by Induction. In Proc. of the IEEE Computer Security Foundations Workshop, pages 70–83. IEEE Computer Society Press, 1997. 271
-
(1997)
In Proc. Of the IEEE Computer Security Foundations Workshop
, pp. 70-83
-
-
Paulson, L.C.1
|