-
2
-
-
33646178489
-
MOCHA: Modularity in model checking
-
A. Hu and M. Vardi, editors, CAV 98: Computer-aided Verification, Springer-Verlag
-
R. Alur, T. Henzinger, F. Mang, S. Qadeer, S. Rajamani, and S. Tasiran. MOCHA: modularity in model checking. In A. Hu and M. Vardi, editors, CAV 98: Computer-aided Verification, Lecture Notes in Computer Science 1427, pages 521-525. Springer-Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1427
, pp. 521-525
-
-
Alur, R.1
Henzinger, T.2
Mang, F.3
Qadeer, S.4
Rajamani, S.5
Tasiran, S.6
-
3
-
-
0030646696
-
Optimistic protocols for fair exchange
-
T. Matsumoto, editor, Zurich, Switzerland, Apr. ACM Press
-
N. Asokan, M. Schunter, and M. Waidner. Optimistic protocols for fair exchange. In T. Matsumoto, editor, 4th ACM Conference on Computer and Communications Security, pages 6, 8-17, Zurich, Switzerland, Apr. 1997. ACM Press.
-
(1997)
4th ACM Conference on Computer and Communications Security
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
4
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
Oakland, CA, May IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86-99, Oakland, CA, May 1998. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
5
-
-
84856533229
-
Exploring fair exchange protocols using specification animation
-
The Third International Workshop on Information Security - ISW2000, Australia, Dec. Springer-Verlag
-
C. Boyd and P. Kearney. Exploring fair exchange protocols using specification animation. In The Third International Workshop on Information Security - ISW2000, Lecture Notes in Computer Science, pages 209-223, Australia, Dec. 2000. Springer-Verlag.
-
(2000)
Lecture Notes in Computer Science
, pp. 209-223
-
-
Boyd, C.1
Kearney, P.2
-
6
-
-
0000523051
-
A logic of authentication
-
Dec.
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Proceedings of the Royal Society of London, 426(1871):233-271, Dec. 1989.
-
(1989)
Proceedings of the Royal Society of London
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
7
-
-
0035751922
-
Inductive methods and contract-signing protocols
-
P. Samarati, editor, ACM Press, Nov.
-
R. Chadha, M. Kanovich, and A. Scedrov. Inductive methods and contract-signing protocols. In P. Samarati, editor, 8-th ACM Conference on Computer and Communications Security, pages 176-185. ACM Press, Nov. 2001.
-
(2001)
8-th ACM Conference on Computer and Communications Security
, pp. 176-185
-
-
Chadha, R.1
Kanovich, M.2
Scedrov, A.3
-
9
-
-
84957060126
-
Abuse-free optimistic contract signing
-
Advances in Cryptology: Proceedings of Crypto'99, Springer-Verlag
-
J. A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In Advances in Cryptology: Proceedings of Crypto'99, volume 1666 of Lecture Notes in Computer Science, pages 449-466. Springer-Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1666
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.3
-
10
-
-
84906087402
-
Abstract interpretation of game properties
-
SAS 2000: Intertional Symposium on Static Analysis, Springer-Verlag
-
T. Henzinger, R. Manjumdar, F. Mang, and J.-F. Raskin. Abstract interpretation of game properties. In SAS 2000: Intertional Symposium on Static Analysis, Lecture Notes in Computer Science, pages 220-239. Springer-Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, pp. 220-239
-
-
Henzinger, T.1
Manjumdar, R.2
Mang, F.3
Raskin, J.-F.4
-
11
-
-
84944080333
-
A game-based verification of non-repudiation and fair exchange protocols
-
K. Larsen and M. Nielsen, editors, Concurrency Theory - Concur 2001, Aalborg, Denmark, Aug. Springer-Verlag
-
S. Kremer and J.-F. Raskin. A game-based verification of non-repudiation and fair exchange protocols. In K. Larsen and M. Nielsen, editors, Concurrency Theory - Concur 2001, volume 2154 of Lecture Notes in Computer Science, pages 551-565, Aalborg, Denmark, Aug. 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2154
, pp. 551-565
-
-
Kremer, S.1
Raskin, J.-F.2
-
12
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Nov.
-
G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, 56(3):131-133, Nov. 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
13
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Lecture Notes in Computer Science, 1055:147-157, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-157
-
-
Lowe, G.1
-
14
-
-
84949740740
-
Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
-
C. A. Meadows. Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches. Lecture Notes in Computer Science, 1146:351-365, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 351-365
-
-
Meadows, C.A.1
-
15
-
-
24944538962
-
Certified E-mail with invisible post offices
-
Available from author; an invited
-
S. Micali. Certified E-mail with invisible post offices. Available from author; an invited presentation at the RSA '97 conference, 1997.
-
(1997)
RSA '97 Conference
-
-
Micali, S.1
-
16
-
-
0030705795
-
Proving properties of security protocols by induction
-
IEEE Computer Society Press, June
-
L. C. Paulson. Proving properties of security protocols by induction. In Proceedings of the 10th Computer Security Foundations Workshop, pages 70-83. IEEE Computer Society Press, June 1997.
-
(1997)
Proceedings of the 10th Computer Security Foundations Workshop
, pp. 70-83
-
-
Paulson, L.C.1
-
19
-
-
84944317155
-
Analysis of abuse-free contract signing
-
Financial Cryptography '00, Anguilla, British West Indies, Feb. Springer-Verlag
-
V. Shmatikov and J. Mitchell. Analysis of abuse-free contract signing. In Financial Cryptography '00, volume 1962 of Lecture Notes in Computer Science, pages 174-191, Anguilla, British West Indies, Feb. 2000. Springer-Verlag.
-
(2000)
Lecture Notes in Computer Science
, vol.1962
, pp. 174-191
-
-
Shmatikov, V.1
Mitchell, J.2
|