-
1
-
-
4243352588
-
-
Research Report 460, University of Cambridge — Computer Laboratory
-
G. Bella. Message Reception in the Inductive Approach. Research Report 460, University of Cambridge — Computer Laboratory, 1999.
-
(1999)
Message Reception in the Inductive Approach
-
-
Bella, G.1
-
4
-
-
84944035753
-
Formal Verification of Cardholder Registration in SET
-
F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Springer-Verlag
-
G. Bella, F. Massacci, L.C. Paulson, and P. Tramontano. Formal Verification of Cardholder Registration in SET. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Proc. of the 6th European Symposium on Research in Computer Security (ESORICS 2000), LNCS 1895, pages 159–174. Springer-Verlag, 2000.
-
(2000)
Proc. Of the 6Th European Symposium on Research in Computer Security (ESORICS 2000), LNCS 1895
, pp. 159-174
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
Tramontano, P.4
-
5
-
-
22444455879
-
Kerberos Version IV: Inductive Analysis of the Secrecy Goals
-
J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Springer-Verlag
-
G. Bella and L.C. Paulson. Kerberos Version IV: Inductive Analysis of the Secrecy Goals. In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Proc. of the 5th European Symposium on Research in Computer Security (ESORICS’98), LNCS 1485, pages 361–375. Springer-Verlag, 1998.
-
(1998)
Proc. Of the 5Th European Symposium on Research in Computer Security (ESORICS’98), LNCS 1485
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
6
-
-
84863900858
-
Mechanising BAN Kerberos by the Inductive Method
-
A. J. Hu and M. Y. Vardi, editors, Springer- Verlag
-
G. Bella and L.C. Paulson. Mechanising BAN Kerberos by the Inductive Method. In A. J. Hu and M. Y. Vardi, editors, Proc. of the International Conference on Computer-Aided Verification (CAV’98), LNCS 1427, pages 416–427. Springer- Verlag, 1998.
-
(1998)
Proc. Of the International Conference on Computer-Aided Verification (CAV’98), LNCS 1427
, pp. 416-427
-
-
Bella, G.1
Paulson, L.C.2
-
7
-
-
0025246897
-
A Fair Protocol for Signing Contracts
-
M. Ben-Or, O. Goldreich, S. Micali, and R. Rivest. A Fair Protocol for Signing Contracts. IEEE Transactions on Information Theory, 36(1):40–46, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.4
-
8
-
-
0030084918
-
The NRL Protocol Analyzer: An Overview
-
C.A. Meadows. The NRL Protocol Analyzer: An Overview. Journal of Logic Programming, 26(2):113–131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.A.1
-
12
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
L.C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6:85–128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
|