-
2
-
-
21444442468
-
Deciding cryptographic protocol adequacy with HOL: The implementation
-
Turku, Finland, August Springer-Verlag
-
S. Brackin. Deciding cryptographic protocol adequacy with HOL: The implementation. In Theorem Proving in Higher Order Logics, number 1125 in Lecture Notes in Computer Science, pages 61-76, Turku, Finland, August 1996. Springer-Verlag.
-
(1996)
Theorem Proving in Higher Order Logics, Number 1125 in Lecture Notes in Computer Science
, pp. 61-76
-
-
Brackin, S.1
-
3
-
-
0029718781
-
A HOL extension of GNY for automatically analyzing cryptographic protocols
-
County Kerry, Ireland, June IEEE
-
S. Brackin. A HOL extension of GNY for automatically analyzing cryptographic protocols. In Proceedings of Computer Security Poundations Workshop IX, County Kerry, Ireland, June 1996. IEEE.
-
(1996)
Proceedings of Computer Security Poundations Workshop IX
-
-
Brackin, S.1
-
5
-
-
0030679458
-
An interface specification language for automatically analyzing cryptographic protocols
-
San Diego, CA, February IEEE
-
S. Brackin. An interface specification language for automatically analyzing cryptographic protocols. In Internet Society Symposium on Network and Distributed System Security, San Diego, CA, February 1997. IEEE.
-
(1997)
Internet Society Symposium on Network and Distributed System Security
-
-
Brackin, S.1
-
6
-
-
0031629945
-
Evaluating and improving protocol analysis by automatic proof
-
Rockport, MA, June IEEE
-
S. Brackin. Evaluating and improving protocol analysis by automatic proof. In Proceedings of Computer Security Foundations Workshop XI, Rockport, MA, June 1998. IEEE.
-
(1998)
Proceedings of Computer Security Foundations Workshop XI
-
-
Brackin, S.1
-
8
-
-
85053863651
-
-
Technical Report Area Systems / Exodus Communications, Ithaca, NY, June
-
S. Brackin. Empirical Tests of the Automatic Authentication Protocol Analyzer, 2nd Version (AAPA2). Technical Report 99006, Area Systems / Exodus Communications, Ithaca, NY, June 1999.
-
(1999)
Empirical Tests of The Automatic Authentication Protocol Analyzer, 2nd Version (AAPA2)
-
-
Brackin, S.1
-
11
-
-
85053863651
-
-
Technical Report Area Systems / Exodus Communications, Ithaca, NY, June
-
S. Brackin. User's Manual for the Automatic Authentication Protocol Analyzer, 2nd Version (AAPA2). Technical Report 98027, Area Systems / Exodus Communications, Ithaca, NY, June 1999.
-
(1999)
User'S Manual for The Automatic Authentication Protocol Analyzer, 2nd Version (AAPA2)
-
-
Brackin, S.1
-
12
-
-
0004215976
-
-
Technical Report Digital Equipment Corporation, Systems Research Center, Palo Alto, CA, February
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Technical Report 39, Digital Equipment Corporation, Systems Research Center, Palo Alto, CA, February 1990.
-
(1990)
A Logic of Authentication
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
14
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
Oakland, CA, May IEEE
-
L. Gong, R. Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the Symposium on Security and Privacy, pages 234¬248, Oakland, CA, May 1990. IEEE.
-
(1990)
Proceedings of The Symposium on Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
15
-
-
0342658605
-
Breaking and fixing the needham-schroeder public-key protocol using FDR
-
New York, Springer-Verlag
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TAG AS, number 1055 in Lecture Notes in Computer Science, pages 147-166, New York, 1996. Springer-Verlag.
-
(1996)
Proceedings of TAG AS, Number 1055 in Lecture Notes in Computer Science
, pp. 147-166
-
-
Lowe, G.1
-
16
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
17
-
-
0023295108
-
The interrogator: Protocol security analysis
-
February
-
J. Millen, S. Clark, and S. Freedman. The Interrogator: Protocol security analysis. IEEE Trans, on Software Engineering, SE-13(2):274-288, February 1987.
-
(1987)
IEEE Trans, on Software Engineering
, vol.SE-13
, Issue.2
, pp. 274-288
-
-
Millen, J.1
Clark, S.2
Freedman, S.3
-
18
-
-
0023295108
-
The interrogator: Protocol security analysis
-
February
-
J. Millen, S. Clark, and S. Freedman. The Interrogator: Protocol security analysis. IEEE Trans, on Software Engineering, SE-13(2):274-288, February 1987.
-
(1987)
IEEE Trans, on Software Engineering
, vol.SE-13
, Issue.2
, pp. 274-288
-
-
Millen, J.1
Clark, S.2
Freedman, S.3
-
20
-
-
85053873566
-
-
K . Slind. H0L98. A t www.cl.cam.ac.uk/Research/HVG/FTP, 1998.
-
(1998)
H0L98. A T
-
-
Slind, K.1
|