-
1
-
-
35048861871
-
Just fast keying in the pi calculus
-
volume 2986 of LNCS, Springer
-
M. Abadi, B. Blanchet, and C. Fournet. Just fast keying in the pi calculus. In Proceedings of the 13th European Symposium on Programming (ESOP'04), volume 2986 of LNCS, pages 340-354. Springer, 2004.
-
(2004)
Proceedings of the 13th European Symposium on Programming (ESOP'04)
, pp. 340-354
-
-
Abadi, M.1
Blanchet, B.2
Fournet, C.3
-
4
-
-
1442336684
-
A semantics for web services authentication
-
An extended version appears as Microsoft Research Technical Report MSR-TR-2003-83
-
K. Bhargavan, C. Fournet, and A. D. Gordon. A semantics for web services authentication. In 31st ACM Symposium on Principles of Programming Languages (POPL'04), pages 198-209, 2004. An extended version appears as Microsoft Research Technical Report MSR-TR-2003-83.
-
(2004)
31st ACM Symposium on Principles of Programming Languages (POPL'04)
, pp. 198-209
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
-
7
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society
-
B. Blanchet. An efficient cryptographic protocol verifier based on Prolog rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96. IEEE Computer Society, 2001.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 82-96
-
-
Blanchet, B.1
-
8
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
volume 2477 of LNCS, Springer
-
B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 342-359. Springer, 2002.
-
(2002)
9th International Static Analysis Symposium (SAS'02)
, pp. 342-359
-
-
Blanchet, B.1
-
10
-
-
0141908648
-
Securing SOAP e-services
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Securing SOAP e-services. International Journal of Information Security, 1(2):100-115, 2002.
-
(2002)
International Journal of Information Security
, vol.1
, Issue.2
, pp. 100-115
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
15
-
-
0141998527
-
Validating a web service security abstraction by typing
-
An extended version appears as Microsoft Research Technical Report MSR-TR-2002-108
-
A. D. Gordon and R. Pucella. Validating a web service security abstraction by typing. In ACM Workshop on XML Security 2002, pages 18-29, 2003. An extended version appears as Microsoft Research Technical Report MSR-TR-2002-108.
-
(2003)
ACM Workshop on XML Security 2002
, pp. 18-29
-
-
Gordon, A.D.1
Pucella, R.2
-
16
-
-
84954108452
-
-
MSDN, May
-
M. Gudgin. Using WS-Trust and WS-SecureConversation. MSDN, May 2004. At http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnwebsrv/html/ws-trustandsecureconv.asp.
-
(2004)
Using WS-Trust and WS-SecureConversation
-
-
Gudgin, M.1
-
27
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
28
-
-
85024252307
-
Inductive analysis of the internet protocol TLS
-
L. C. Paulson. Inductive analysis of the internet protocol TLS. ACM Trans. Inf. Syst. Secur., 2(3):332-351, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.3
, pp. 332-351
-
-
Paulson, L.C.1
-
29
-
-
33645964737
-
-
W3C. SOAP Version 1.2, at
-
W3C. SOAP Version 1.2, 2003. W3C Recommendation, at http://www.w3.org/TR/soap12.
-
(2003)
W3C Recommendation
-
-
|