-
3
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22 January
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
4
-
-
0000523051
-
A logic of authentication
-
39, February
-
M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. Proceedings of the Royal Society of London A, 426:233-271, 1989. A preliminary version appeared as Digital Equipment Corporation Systems Research Center report No. 39, February 1989.
-
(1989)
Proceedings of the Royal Society of London A
, vol.426
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
5
-
-
0027113388
-
The chemical abstract machine
-
April
-
G. Berry and G. Boudol. The chemical abstract machine. Theoretical Computer Science, 96(1):217-248, April 1992.
-
(1992)
Theoretical Computer Science
, vol.96
, Issue.1
, pp. 217-248
-
-
Berry, G.1
Boudol, G.2
-
6
-
-
0000036723
-
Testing equivalence for mobile processes
-
August
-
M. Boreale and R. De Nicola. Testing equivalence for mobile processes. Information and Computation, 120(2):279-303, August 1995.
-
(1995)
Information and Computation
, vol.120
, Issue.2
, pp. 279-303
-
-
Boreale, M.1
De Nicola, R.2
-
7
-
-
84957926064
-
-
Inform. Processing Standards Pub. 46, National Bureau of Standards, Washington DC
-
Data encryption standard. Fed. Inform. Processing Standards Pub. 46, National Bureau of Standards, Washington DC, January 1977.
-
(1977)
, vol.January
-
-
-
11
-
-
0042664779
-
Authentication in distributed systems: A bibliography
-
A. Liebl. Authentication in distributed systems: A bibliography. ACM Operating Systems Review, 27(4):31-41, 1993.
-
(1993)
ACM Operating Systems Review
, vol.27
, Issue.4
, pp. 31-41
-
-
Liebl, A.1
-
12
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Lecture Notes in Computer Science, Springer Verlag
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer Verlag, 1996.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
13
-
-
0023295108
-
The Interrogator: Protocol security analysis
-
February
-
J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, SE-13(2):274-288, February 1987.
-
(1987)
IEEE Transactions on Software Engineering, SE
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
14
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
C. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1):5-36, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 5-36
-
-
Meadows, C.1
-
18
-
-
84957926065
-
-
Undergraduate lecture notes, Cambridge University
-
R. Milner. The 7r-calculus. Undergraduate lecture notes, Cambridge University, 1995.
-
(1995)
The 7R-Calculus
-
-
Milner, R.1
-
21
-
-
0003851399
-
-
John Wiley & Sons, Inc., second edition
-
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., second edition, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
|