-
1
-
-
85116870609
-
On the reachability problem in cryptographic protocols
-
Marseille France
-
R. Amadio and D Lugiez. On the Reachability Problem in Cryptographic Protocols. In RR-INRIA - 3915. Marseille (France).
-
RR-INRIA - 3915
-
-
Amadio, R.1
Lugiez, D.2
-
2
-
-
84961379291
-
Lazy infinite-state analysis of security protocols
-
R. Baumgart, editor, Springer-Verlag, Düsseldorf Germany
-
D. Basin. Lazy Infinite-State Analysis of Security Protocols. In R. Baumgart, editor, Secure Networking - CQRE'99, volume 1740 of Lecture Notes in Computer Science, pages 30-42. Springer-Verlag, Düsseldorf (Germany), 1999.
-
(1999)
Secure Networking - CQRE'99, Volume 1740 of Lecture Notes in Computer Science
, pp. 30-42
-
-
Basin, D.1
-
3
-
-
0030716978
-
Towards the formal verification of electronic commerce protocols
-
IEEE Computer Society
-
D. Bolignano. Towards the formal verification of electronic commerce protocols. In IEEE Computer Security Foundations Workshop, pages 133-146. IEEE Computer Society, 1997.
-
(1997)
IEEE Computer Security Foundations Workshop
, pp. 133-146
-
-
Bolignano, D.1
-
8
-
-
0020720357
-
On the security of public key protocols
-
Also STAN-CS-81-854, 1981, Stanford U
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29:198-208, 1983. Also STAN-CS-81-854, 1981, Stanford U.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
9
-
-
0039926997
-
A compiler for analysing cryptographic protocols using noninterference
-
A. Durante, R. Focardi, and R. Gorrieri. A Compiler for Analysing Cryptographic Protocols Using Noninterference. ACM Transactions on Software Engineering and Methodology, 9(4):489-530, 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.4
, pp. 489-530
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
10
-
-
84956860311
-
Compiling and verifying security protocols
-
M. Parigot and A. Voronkov, editors, St Gilles R6union, France, November Springer-Verlag
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and Verifying Security Protocols. In M. Parigot and A. Voronkov, editors, Logic for Programming and Automated Reasoning, volume 1955 of Lecture Notes in Computer Science, pages 131-160, St Gilles (R6union, France), November 2000. Springer-Verlag.
-
(2000)
Logic for Programming and Automated Reasoning, Volume 1955 of Lecture Notes in Computer Science
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
11
-
-
0031633395
-
CASpEr: A compiler for the analysis of security protocols
-
G. Lowe. Casper: a compiler for the analysis of security protocols. Journal of Computer Security, 6(1):53-84,1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 53-84
-
-
Lowe, G.1
-
12
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
C. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1):5-36, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 5-36
-
-
Meadows, C.1
-
13
-
-
0030705405
-
Automated analysis of cryptographic protocols using Murø
-
IEEE Computer Society
-
J. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using Murø. In IEEE Symposium on Security and Privacy, pages 141-154. IEEE Computer Society, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 141-154
-
-
Mitchell, J.1
Mitchell, M.2
Stern, U.3
-
15
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.1
|