-
1
-
-
0036040302
-
Analyzing Security Protocols with Secrecy Types and Logic Programs
-
Portland, Oregon, Jan, ACM Press
-
M. Abadi and B. Blanchet. Analyzing Security Protocols with Secrecy Types and Logic Programs. In 29th Annual ACM Symposium on Principles of Programming Languages (POPL 2002), pages 33-44, Portland, Oregon, Jan. 2002. ACM Press.
-
(2002)
29Th Annual ACM Symposium on Principles of Programming Languages (POPL 2002)
, pp. 33-44
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
17644411480
-
Mobile Values, New Names, and Secure Communication
-
London, United Kingdom, Jan, ACM Press
-
M. Abadi and C. Fournet. Mobile Values, New Names, and Secure Communication. In 28th Annual ACM Symposium on Principles of Programming Languages (POPL’01), pages 104-115, London, United Kingdom, Jan. 2001. ACM Press.
-
(2001)
28Th Annual ACM Symposium on Principles of Programming Languages (POPL’01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, Jan. 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
4
-
-
84958762859
-
The game of the name in cryptographic tables
-
In P. S. Thiagarajan and R. Yap, editors, Phuket, Thailand, Dec, Springer Verlag
-
R. Amadio and S. Prasad. The game of the name in cryptographic tables. In P. S. Thiagarajan and R. Yap, editors, Advances in Computing Science - ASIAN’99, volume 1742 of LNCS, pages 15-27, Phuket, Thailand, Dec. 1999. Springer Verlag.
-
(1999)
Advances in Computing Science - ASIAN’99, Volume 1742 of LNCS
, pp. 15-27
-
-
Amadio, R.1
Prasad, S.2
-
5
-
-
19144369108
-
Programming Satan’s Computer
-
J. van Leeuven, editor, Springer Verlag
-
R. Anderson and R. Needham. Programming Satan’s Computer. In J. van Leeuven, editor, Computer Science Today: Recent Trends and Developments, volume 1000 of LNCS, pages 426-440. Springer Verlag, 1995.
-
(1995)
Computer Science Today: Recent Trends and Developments, Volume 1000 of LNCS
, pp. 426-440
-
-
Anderson, R.1
Needham, R.2
-
6
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
Cape Breton, Nova Scotia, Canada, June, IEEE Computer Society. Extended version
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society. Extended version available at http://www.di.ens.fr/˜blanchet/longcsfw14.ps.gz.
-
(2001)
14Th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 82-96
-
-
Blanchet, B.1
-
7
-
-
84944038631
-
Automating Data Independence
-
Toulouse, France, Oct, Springer Verlag
-
P. Broadfoot, G. Lowe, and B. Roscoe. Automating Data Independence. In 6th European Symposium on Research in Computer Security (ESORICS 2000), volume 1895 of LNCS, pages 175-190, Toulouse, France, Oct. 2000. Springer Verlag.
-
(2000)
6Th European Symposium on Research in Computer Security (ESORICS 2000), Volume 1895 of LNCS
, pp. 175-190
-
-
Broadfoot, P.1
Lowe, G.2
Roscoe, B.3
-
11
-
-
0033718532
-
TAPS: A First-Order Verifier for Cryptographic Protocols
-
Cambridge, England, July
-
E. Cohen. TAPS: A First-Order Verifier for Cryptographic Protocols. In 13th IEEE Computer Security Foundations Workshop (CSFW-13), pages 144-158, Cambridge, England, July 2000.
-
(2000)
13Th IEEE Computer Security Foundations Workshop (CSFW-13)
, pp. 144-158
-
-
Cohen, E.1
-
12
-
-
0034829261
-
Proving secrecy is easy enough
-
Cape Breton, Nova Scotia, Canada, June, IEEE Computer Society
-
V. Cortier, J. Millen, and H. Rueß. Proving secrecy is easy enough. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 97-108, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society.
-
(2001)
14Th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 97-108
-
-
Cortier, V.1
Millen, J.2
Rueß, H.3
-
13
-
-
0003332235
-
A New Algorithm for the Automatic Verification of Authentication Protocols: From Specifications to Flaws and AttackScenarios
-
Rutgers University, New Jersey, Sept
-
M. Debbabi, M. Mejri, N. Tawbi, and I. Yahmadi. A New Algorithm for the Automatic Verification of Authentication Protocols: From Specifications to Flaws and AttackScenarios. In DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, New Jersey, Sept. 1997.
-
(1997)
DIMACS Workshop on Design and Formal Verification of Security Protocols
-
-
Debbabi, M.1
Mejri, M.2
Tawbi, N.3
Yahmadi, I.4
-
14
-
-
0034835462
-
Authenticity by Typing for Security Protocols
-
Cape Breton, Nova Scotia, Canada, June, IEEE Computer Society
-
A. Gordon and A. Jeffrey. Authenticity by Typing for Security Protocols. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 145-159, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 145-159
-
-
Gordon, A.1
Jeffrey, A.2
-
15
-
-
84948759702
-
Types and Effects for Asymmetric Cryptographic Protocols
-
Cape Breton, Nova Scotia, Canada, June, IEEE Computer Society
-
A. Gordon and A. Jeffrey. Types and Effects for Asymmetric Cryptographic Protocols. In 15th IEEE Computer Security Foundations Workshop (CSFW-15), Cape Breton, Nova Scotia, Canada, June 2002. IEEE Computer Society.
-
(2002)
15Th IEEE Computer Security Foundations Workshop (CSFW-15)
-
-
Gordon, A.1
Jeffrey, A.2
-
16
-
-
0033683607
-
Towards automatic verification of authentication protocols on an unbounded network
-
Cambridge, England, July
-
J. Heather and S. Schneider. Towards automatic verification of authentication protocols on an unbounded network. In 13th IEEE Computer Security Foundations Workshop (CSFW-13), pages 132-143, Cambridge, England, July 2000.
-
(2000)
13Th IEEE Computer Security Foundations Workshop (CSFW-13)
, pp. 132-143
-
-
Heather, J.1
Schneider, S.2
-
20
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
Dec
-
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Commun. ACM, 21(12):993-999, Dec. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
21
-
-
0023247970
-
Efficient and Timely Mutual Authentication
-
D. Otway and O. Rees. Efficient and Timely Mutual Authentication. Operating Systems Review, 21(1):8-10, 1987.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
22
-
-
0031643297
-
The Inductive Approach to Verifying Cryptographic Protocols
-
L. C. Paulson. The Inductive Approach to Verifying Cryptographic Protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
23
-
-
0033344294
-
Proving Security Protocols with Model Checkers by Data Independence Techniques
-
A. W. Roscoe and P. J. Broadfoot. Proving Security Protocols with Model Checkers by Data Independence Techniques. Journal of Computer Security, 7(2-3):147-190, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 147-190
-
-
Roscoe, A.W.1
Broadfoot, P.J.2
-
24
-
-
0032678887
-
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
-
Mordano, Italy, June
-
D. X. Song. Athena: a New Efficient Automatic Checker for Security Protocol Analysis. In 12th IEEE Computer Security Foundation Workshop (CSFW-12), Mordano, Italy, June 1999.
-
(1999)
12Th IEEE Computer Security Foundation Workshop (CSFW-12)
-
-
Song, D.X.1
-
25
-
-
84957640213
-
Towards an Automatic Analysis of Security Protocols in First-Order Logic
-
In H. Ganzinger, editor, Trento, Italy, July, Springer Verlag
-
C. Weidenbach. Towards an Automatic Analysis of Security Protocols in First-Order Logic. In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16), volume 1632 of Lecture Notes in Artificial Intelligence, pages 314-328, Trento, Italy, July 1999. Springer Verlag.
-
(1999)
16Th International Conference on Automated Deduction (CADE-16), Volume 1632 of Lecture Notes in Artificial Intelligence
, pp. 314-328
-
-
Weidenbach, C.1
-
26
-
-
0026630927
-
Authentication for distributed systems
-
Jan
-
T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. Computer, 25(1):39-52, Jan. 1992.
-
(1992)
Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.1
Lam, S.S.2
-
28
-
-
13644258471
-
Authentication for distributed systems
-
In D. Denning and P. Denning, editors, ACM Press and Addison-Wesley, Oct
-
T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. In D. Denning and P. Denning, editors, Internet Besieged: Countering Cyberspace Scofflaws. ACM Press and Addison-Wesley, Oct. 1997.
-
(1997)
Internet Besieged: Countering Cyberspace Scofflaws
-
-
Woo, T.1
Lam, S.S.2
|