-
1
-
-
84937555465
-
Secrecy types for asymmetric communication
-
F. Honsel and M. Miculan, editors, Springer-Verlag
-
M. Abadi and B. Blanchet. Secrecy types for asymmetric communication. In F. Honsel and M. Miculan, editors, Proc. Foundation of Software Science and Computation Structures (FoSSaCS 2001), volume 2030 of LNCS, pages 25-41. Springer-Verlag, 2001.
-
(2001)
Proc. Foundation of Software Science and Computation Structures (Fossacs 2001), Volume 2030 of LNCS
, pp. 25-41
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
85006614284
-
Verifying security protocols as planning in logic programming
-
L. C. Aiello and F. Massacci. Verifying security protocols as planning in logic programming. Transactions on Computational Logic, 2(4):542-580, 2001.
-
(2001)
Transactions on Computational Logic
, vol.2
, Issue.4
, pp. 542-580
-
-
Aiello, L.C.1
Massacci, F.2
-
5
-
-
84961379291
-
Lazy infinite-state analysis of security protocols
-
Springer-Verlag
-
D. Basin. Lazy infinite-state analysis of security protocols. In R. Baumgart, editor, Secure Networking - CQRE (Secure) ’99, International Exhibition and Congress, volume 1740 of LNCS, pages 30-42. Springer-Verlag, 1999.
-
(1999)
R. Baumgart, Editor, Secure Networking - CQRE (Secure) ’99, International Exhibition and Congress, Volume 1740 of LNCS
, pp. 30-42
-
-
Basin, D.1
-
6
-
-
22444455879
-
Kerberos version IV: Inductive analysis of the secrecy goals
-
In J.-J. Quisquater, editor, Louvain-la-Neuve, Belgium, Springer-Verlag
-
G. Bella and L. C. Paulson. Kerberos version IV: Inductive analysis of the secrecy goals. In J.-J. Quisquater, editor, Proc. 5th European Symposium on Research in Computer Security, volume 1485 of LNCS, pages 361-375, Louvain-la-Neuve, Belgium, 1998. Springer-Verlag.
-
(1998)
Proc. 5Th European Symposium on Research in Computer Security, Volume 1485 of LNCS
, pp. 361-375
-
-
Bella, G.1
Paulson, L.C.2
-
9
-
-
54249156030
-
Ensuring security through model checking in a logical environment (Preliminary results)
-
G. Delzanno, S. Etalle, and M. Gabbrielli, editors
-
M. Bozzano. Ensuring security through model checking in a logical environment (preliminary results). In G. Delzanno, S. Etalle, and M. Gabbrielli, editors, Proc. Workshop on Specification, Analysis and Validation for Emerging Technologies (SAVE01), 2001.
-
(2001)
Proc. Workshop on Specification, Analysis and Validation for Emerging Technologies (SAVE01)
-
-
Bozzano, M.1
-
10
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
11
-
-
0032671775
-
A meta-notation for protocol analysis
-
IEEE Computer Society Press
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. A meta-notation for protocol analysis. In PCSFW: Proc. 12th Computer Security Foundations Workshop, pages 55-69. IEEE Computer Society Press, 1999.
-
(1999)
PCSFW: Proc. 12Th Computer Security Foundations Workshop
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
12
-
-
0033698744
-
Relating strands and multiset rewriting for security protocol analysis
-
IEEE Computer Society Press
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Relating strands and multiset rewriting for security protocol analysis. In PCSFW: Proc. 13th Computer Security Foundations Workshop, pages 35-51. IEEE Computer Society Press, 2000.
-
(2000)
PCSFW: Proc. 13Th Computer Security Foundations Workshop
, pp. 35-51
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
17
-
-
84879482667
-
Proof theory, transformations, and logic programming for debugging security protocols
-
A. Pettorossi, editor, Springer-Verlag
-
G. Delzanno and S. Etalle. Proof theory, transformations, and logic programming for debugging security protocols. In A. Pettorossi, editor, Proc. Eleventh International Workshop on Logic Program Synthesis and Transformation – LOPSTR 2001, LNCS, pages 76–91. Springer-Verlag, 2002.
-
(2002)
Proc. Eleventh International Workshop on Logic Program Synthesis and Transformation – LOPSTR 2001, LNCS
, pp. 76-91
-
-
Delzanno, G.1
Etalle, S.2
-
23
-
-
84956860311
-
Compiling and verifying security protocols
-
M. Parigot and A. Vonkorov, editors, Springer-Verlag
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and verifying security protocols. In M. Parigot and A. Vonkorov, editors, Proc. LPAR: International Conference on Logic for Programming and Automated Reasoning, number 1995 in LNCS, pages 131-160. Springer-Verlag, 2000.
-
(2000)
Proc. LPAR: International Conference on Logic for Programming and Automated Reasoning, Number 1995 in LNCS
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
24
-
-
0003453263
-
Foundations of Logic Programming
-
Springer-Verlag, Berlin, Second edition
-
J. W. Lloyd. Foundations of Logic Programming. Symbolic Computation - Artificial Intelligence. Springer-Verlag, Berlin, 1987. Second edition.
-
(1987)
Symbolic Computation - Artificial Intelligence
-
-
Lloyd, J.W.1
-
25
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Springer-Verlag, Berlin Germany
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 1055, pages 147-166. Springer-Verlag, Berlin Germany, 1996.
-
(1996)
Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
28
-
-
84955602379
-
Formal verification of cryptographic protocols: A survey
-
Springer-Verlag
-
C. Meadows. Formal verification of cryptographic protocols: A survey. In J. Pieprzyk and R. Safavi-Naini, editors, Advances in Cryptology - ASIACRYPT ’ 94, LNCS, pages 133-150. Springer-Verlag, 1995.
-
(1995)
J. Pieprzyk and R. Safavi-Naini, Editors, Advances in Cryptology - ASIACRYPT ’ 94, LNCS
, pp. 133-150
-
-
Meadows, C.1
-
29
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
31
-
-
0023295108
-
The Interrogator: Protocol security analysis
-
February, Special Issue on Computer Security and Privacy
-
J. K. Millen, S. C. Clark, and S. B. Freedman. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, 13(2):274-288, February 1987. Special Issue on Computer Security and Privacy.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
34
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
38
-
-
0003777431
-
-
P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, and B. Roscoe. Modelling and analysis of security protocols, 2001.
-
(2001)
Modelling and Analysis of Security Protocols
-
-
Ryan, P.1
Schneider, S.2
Goldsmith, M.3
Lowe, G.4
Roscoe, B.5
-
39
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D. X. Song, S. Berezin, and A. Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1-2):47-74, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.X.1
Berezin, S.2
Perrig, A.3
-
40
-
-
0002508587
-
A lesson on authenticated protocol design
-
T.Y.C. Woo and S. S. Lam. A lesson on authenticated protocol design. Operating Systems Review, 28(3):24-37, 1994.
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 24-37
-
-
Woo, T.1
Lam, S.S.2
|