-
1
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
[1] M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1–70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
2
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
LNCS
-
[2] R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In Proc. of CONCUR, volume 1877 of LNCS, pages 380–394, 2000.
-
(2000)
Proc. Of CONCUR
, vol.1877
, pp. 380-394
-
-
Amadio, R.M.1
Lugiez, D.2
-
3
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Press
-
[3] B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In Proc. of CSFW, IEEE Press, pages 82–96, 2001.
-
(2001)
Proc. Of CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
4
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
LNCS
-
[4] M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. of ICALP, LNCS, pages 667–681, 2001.
-
(2001)
Proc. Of ICALP
, pp. 667-681
-
-
Boreale, M.1
-
5
-
-
0034829105
-
Computing symbolic models for verifying cryptographic protocols
-
IEEE Press
-
[5] M. Fiore and M. Abadi. Computing symbolic models for verifying cryptographic protocols. In Proc. of CSFW, IEEE Press, pages 160–173, 2001.
-
(2001)
Proc. Of CSFW
, pp. 160-173
-
-
Fiore, M.1
Abadi, M.2
-
6
-
-
84958046259
-
A uniform approach for the definition of security properties
-
LNCS
-
[6] R. Focardi and F. Martinelli. A uniform approach for the definition of security properties. In Proc. of FM’99, volume 1708 of LNCS, pages 794–813, 1999.
-
(1999)
Proc. Of FM’99
, vol.1708
, pp. 794-813
-
-
Focardi, R.1
Martinelli, F.2
-
7
-
-
0012486231
-
A symbolic approach to value-passing processes
-
J. Bergstra, A. Ponse, and S. Smolka, editors, North-Holland
-
[7] A. Ingólfsdttir, and H. Lin. A symbolic approach to value-passing processes. In J. Bergstra, A. Ponse, and S. Smolka, editors, Handbook of Process Algebra, pages 427–478. North-Holland, 2001.
-
(2001)
Handbook of Process Algebra
, pp. 427-478
-
-
Ingólfsdttir, A.1
Lin, H.2
-
8
-
-
0002132472
-
Fast, automatic checking of security protocols
-
Oakland, California
-
[8] D. Kindred and J. M. Wing. Fast, automatic checking of security protocols. In Proc. of Second USENIX Workshop on Electronic Commerce, pages 41–52, Oakland, California, 1996.
-
(1996)
Proc. Of Second USENIX Workshop on Electronic Commerce
, pp. 41-52
-
-
Kindred, D.1
Wing, J.M.2
-
9
-
-
0033746638
-
Verification of security protocols using LOTOS - Method and application
-
[9] G. Leduc and F. Germeau. Verification of security protocols using LOTOS - method and application. Computer Communications, 23(12):1089–1103, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.12
, pp. 1089-1103
-
-
Leduc, G.1
Germeau, F.2
-
10
-
-
0342658605
-
Breaking and fixing the Needham Schroeder public-key protocol using FDR
-
[10] G. Lowe. Breaking and fixing the Needham Schroeder public-key protocol using FDR. In Proc. of TACAS, volume 1055 of LNCS, pages 147–166, 1996.
-
(1996)
Proc. Of TACAS, Volume 1055 Of LNCS
, pp. 147-166
-
-
Lowe, G.1
-
14
-
-
0000544858
-
Languages for description and analysis of authentication protocols
-
World Scientific
-
[14] F. Martinelli. Languages for description and analysis of authentication protocols. In Proc. of ICTCS, pages 304–315. World Scientific, 1998.
-
(1998)
Proc. Of ICTCS
, pp. 304-315
-
-
Martinelli, F.1
-
15
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
ACM Press
-
[15] J. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In Proc. of CCS, ACM Press, 2001.
-
(2001)
Proc. Of CCS
-
-
Millen, J.1
Shmatikov, V.2
-
17
-
-
0031640904
-
Honest ideals on strand spaces
-
IEEE Computer Society Press
-
[17] Thayer, Herzog, and Guttman D. Honest ideals on strand spaces. In Proc. of CSFW. IEEE Computer Society Press, 1998.
-
(1998)
Proc. Of CSFW
-
-
Thayer, H.1
Guttman, D.2
|