-
1
-
-
84949677030
-
Deciding Cryptographic Protocol Adequacy with HOL: The Implementation
-
Springer-Verlag, LNCS 1125
-
S. H. Brackin. Deciding Cryptographic Protocol Adequacy with HOL: The Implementation. In TPHOLs’96. Springer-Verlag, LNCS 1125, 1996.
-
(1996)
TPHOLs’96
-
-
Brackin, S.H.1
-
2
-
-
84871825723
-
Mechanical Verification of the full Needham-Schroeder public key protocol
-
Royal HoEoway, University of London
-
J. Bryans and S. Schneider. Mechanical Verification of the full Needham-Schroeder public key protocol. Technical report, Royal HoEoway, University of London, 1997.
-
(1997)
Technical report
-
-
Bryans, J.1
Schneider, S.2
-
3
-
-
0004215976
-
A Logic of Authentication
-
Digital Equipment Corporation, System Research Center
-
M. Burrows, M. Abadi, and R. Needham. A Logic of Authentication. Technical Report 39, Digital Equipment Corporation, System Research Center, 1989.
-
(1989)
Technical Report 39
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
4
-
-
0025488389
-
Mechanizing CSP trace theory in higher order logic
-
A. J. Camilleri. Mechanizing CSP trace theory in higher order logic. IEEE Transactions on Software Engineering, 16(9):993-1004, 1990.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.9
, pp. 993-1004
-
-
Camilleri, A.J.1
-
5
-
-
0003341233
-
A tutorial introduction to PVS
-
J. Crow, S. Owre, J. Rushby, N. Shankar, and M. Srivas. A tutorial introduction to PVS. In Workshop on Industrial-Strength Formal Specification Techniques, 1995.
-
(1995)
Workshop on Industrial-Strength Formal Specification Techniques
-
-
Crow, J.1
Owre, S.2
Rushby, J.3
Shankar, N.4
Srivas, M.5
-
6
-
-
84949651836
-
Embedding CSP in PVS. An AppEcation to Authentication Protocols
-
Royal Holoway, CSD-TR-97-12
-
B. Dutertre and S. Schneider. Embedding CSP in PVS. An AppEcation to Authentication Protocols. Technical report, Royal Holoway, CSD-TR-97-12.
-
Technical report
-
-
Dutertre, B.1
Schneider, S.2
-
9
-
-
0003130993
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
-
Springer-Verlag, LNCS 1055
-
G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In Proc. of TACAS’96. Springer-Verlag, LNCS 1055, 1996.
-
(1996)
Proc. of TACAS’96
-
-
Lowe, G.1
-
10
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Comm, of the ACM, 21(12):993-999, 1978.
-
(1978)
Comm, of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
12
-
-
17744375732
-
Proving Properties of Security Protocols by Induction
-
Computer Laboratory, University of Cambridge
-
L. Paulson. Proving Properties of Security Protocols by Induction. Technical Report TR409, Computer Laboratory, University of Cambridge, 1996.
-
(1996)
Technical Report TR409
-
-
Paulson, L.1
-
14
-
-
1442295999
-
Using CSP for protocol analysis: The Needham-Schroeder Public Key Protocol
-
Royal HoEoway
-
S. Schneider. Using CSP for protocol analysis: the Needham-Schroeder Public Key Protocol. Technical Report CSD-TR-96-14, Royal HoEoway, 1996.
-
(1996)
Technical Report CSD-TR-96-14
-
-
Schneider, S.1
-
17
-
-
84949653223
-
An approach to process algebra using IMPS
-
The MITRE Corporation
-
F. J. Thayer. An approach to process algebra using IMPS. Technical Report MP-94B193, The MITRE Corporation, 1994.
-
(1994)
Technical Report MP-94B193
-
-
Thayer, F.J.1
|