-
1
-
-
4544236364
-
-
Version 1.0, July
-
[AETS01] Atmel, Hitachi Europe, Infineon Technologies, and Philips Semiconductors. Smartcard IC Platform Protection Profile, Version 1.0, July 2001.
-
(2001)
Smartcard IC Platform Protection Profile
-
-
-
3
-
-
84958050405
-
Csp2B: A practical approach to combining CSP and B
-
[But99] Michael Butler. csp2B: A practical approach to combining CSP and B. In Proceedings of FM’99: World Congress on Formal Methods, pages 490–508, 1999. http://www.dsse.ecs.soton.ac.uk/techreports/99-2.html.
-
(1999)
Proceedings of FM’99: World Congress on Formal Methods
, pp. 490-508
-
-
Butler, M.1
-
4
-
-
84956979359
-
-
Version 2.1
-
[CC99] Common Criteria for Information Technology Security Evaluation (CC), Version 2.1, 1999. ISO/IEC 15408.
-
(1999)
ISO/IEC 15408
-
-
-
5
-
-
0020720357
-
On the security of public key protocols
-
[DY83] Danny Dolev and Andrew C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198–208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29 IT
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
7
-
-
0003835157
-
The IOA language and toolset: Support for designing, analyzing, and building distributed systems
-
MIT
-
[GL98] Stephen J. Garland and Nancy A. Lynch. The IOA language and toolset: Support for designing, analyzing, and building distributed systems. Technical Report MIT/LCS/TR-762, Laboratory for Computer Science, MIT, August 1998.
-
(1998)
Technical Report MIT/LCS/TR-762, Laboratory for Computer Science
-
-
Garland, S.J.1
Lynch, N.A.2
-
8
-
-
84947766127
-
Autofocus-a tool for distributed systems specification
-
Springer-Verlag
-
[HSSS96] Franz Huber, Bernhard Schätz, Alexander Schmidt, and Katharina Spies. Autofocus-a tool for distributed systems specification. In Proceedings FTRTFT’96-Formal Techniques in Real-Time and Fault-Tolerant Systems, volume 1135 of LNCS, pages 467–470. Springer-Verlag, 1996. See also http://autofocus.in.tum.de/index-e.html.
-
Proceedings FTRTFT’96-Formal Techniques in Real-Time and Fault-Tolerant Systems, Volume 1135 of LNCS
, pp. 467-470
-
-
Huber, F.1
Schätz, B.2
Schmidt, A.3
Spies, K.4
-
9
-
-
84956997714
-
-
June
-
[ITS91] Information Technology Security Evaluation Criteria (ITSEC), June 1991.
-
(1991)
-
-
-
12
-
-
0034244831
-
A Formal Security Model for Microprocessor Hardware
-
August
-
[LKW00] Volkmar Lotz, Volker Kessler, and Georg Walter. A Formal Security Model for Microprocessor Hardware. In IEEE Transactions on Software Engineering, volume 26, pages 702–712, August 2000. http://www.computer.org/tse/ts2000/e8toc.htm.
-
(2000)
IEEE Transactions on Software Engineering
, vol.26
, pp. 702-712
-
-
Lotz, V.1
Kessler, V.2
Walter, G.3
-
13
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Springer-Verlag
-
[Low96] Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS, volume 1055, pages 147–166. Springer-Verlag, 1996.
-
(1996)
Proceedings of TACAS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
15
-
-
0001383866
-
An introduction to input/output automata
-
[LT89] Nancy Lynch and Mark Tuttle. An introduction to input/output automata. CWI Quarterly, 2(3):219–246, 1989. http://theory.lcs.mit.edu/tds/papers/Lynch/CWI89.html.
-
(1989)
CWI Quarterly
, vol.2
, Issue.3
, pp. 219-246
-
-
Lynch, N.1
Tuttle, M.2
-
20
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
[Pau98] Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85–128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
23
-
-
20444448320
-
Extended description techniques for security engineering
-
M. Dupuy and P. Paradinas, editors, Kluwer Academic Publishers
-
[WW01] Guido Wimmel and Alexander Wisspeintner. Extended description techniques for security engineering. In M. Dupuy and P. Paradinas, editors, International Conference on Information Security (IFIP/SEC). Kluwer Academic Publishers, 2001.
-
(2001)
International Conference on Information Security (IFIP/SEC)
-
-
Wimmel, G.1
Wisspeintner, A.2
|