-
2
-
-
0003761061
-
-
Technical Report 414, University of Cambridge Computer Laboratory, January Extended version of both [AG97b]
-
[AG97b] M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Technical Report 414, University of Cambridge Computer Laboratory, January 1997. Extended version of both [AG97a] and [AG97c].
-
(1997)
A calculus for cryptographic protocols: The spi calculus
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
January [AN96]
-
[AN96] M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
5
-
-
0004215976
-
A logic of authentication
-
A preliminary version appeared as Digital Equipment Corporation Systems Research Genter report No. 39, February 1989. [BAN89]
-
[BAN89] M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Genter report No. 39, February 1989.
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
6
-
-
0000036723
-
Testing equivalence for mobile processes
-
August [BN95]
-
[BN95] M, Boreale and R. De Nicola. Testing equivalence for mobile processes. Information and Computation, 12Q(2):279-303, August 1995.
-
(1995)
Information and Computation
, vol.12 Q
, Issue.2
, pp. 279-303
-
-
Boreale, M.1
De Nicola, R.2
-
11
-
-
0003563348
-
-
Van Nostrand Reinhold Company Inc., New York[Gas88]
-
[Gas88] M. Gasser. Building a Secure Computer System. Van Nostrand Reinhold Company Inc., New York, 1988.
-
(1988)
Building a Secure Computer System
-
-
Gasser, M.1
-
13
-
-
0003604327
-
-
Technical Report ECS-LFCS-91-180, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, UK, October 1991. Appeared in Logic and Algebra of Specification, F. L. Bauer, W. Brauer, and H. Schwichtenberg, eds., Springer-Verlag
-
[Mil91] R, Milner. The polyadic π-calculus: a tutorial. Technical Report ECS-LFCS-91-180, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, UK, October 1991. Appeared in Logic and Algebra of Specification, F. L. Bauer, W. Brauer, and H. Schwichtenberg, eds., Springer-Verlag, 1993.
-
(1993)
The polyadic π-calculus: A tutorial
-
-
Milner, R.1
-
14
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
September [MPW92]
-
[MPW92] R. Milner, J. Parrow, and D, Walker. A calculus of mobile processes, parts I and II. Information and Computation, pages 1-40 and 41-77, September 1992.
-
(1992)
Information and Computation
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
16
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December [NS78]
-
[NS78] R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
18
-
-
0003851399
-
-
John Wiley k. Sons, Inc., second edition[Sch96]
-
[Sch96] B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley k. Sons, Inc., second edition, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
19
-
-
0001905093
-
A sound type system for secure flow analysis
-
[VSI96]
-
[VSI96] D. Volpano, G. Smith, and C. Irvine. A sound type system for secure flow analysis. Journal of Computer Security, 4(3):1-21, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.3
, pp. 1-21
-
-
Volpano, D.1
Smith, G.2
Irvine, C.3
|