-
1
-
-
0012842066
-
-
draft-benaloh-pct-00.txt, October
-
Josh Benaloh, Butler Lampson, Daniel Simon, Terence Spies, and Bennet Yee. The private communication technology protocol. draft-benaloh-pct-00.txt, October 1995.
-
(1995)
The Private Communication Technology Protocol
-
-
Benaloh, J.1
Lampson, B.2
Simon, D.3
Spies, T.4
Yee, B.5
-
5
-
-
0025386404
-
A Logic of Authentication
-
February
-
Michael Burrows, Martín Abadi, and Roger Needham. A Logic of Authentication. ACM Transactions in Computer Systems, 8(1):18-36, February 1990.
-
(1990)
ACM Transactions in Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
6
-
-
0032671775
-
A meta-notation for protocol analysis
-
IEEE Computer Society Press, June
-
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. A meta-notation for protocol analysis. In Proceedings of 12th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1999.
-
(1999)
Proceedings of 12th IEEE Computer Security Foundations Workshop
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
8
-
-
1542593353
-
Authentication Authenticated Key Exchanges
-
Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography, 2:107-125, 1992.
-
(1992)
Designs, Codes, and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
10
-
-
0020720357
-
On the Security of Public Key Protocols
-
March
-
D. Dolev and A. Yao. On the Security of Public Key Protocols. IEEE Transactions on Information Theory, 29(2):198-208, March 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
12
-
-
30344457160
-
Using a PVS embedding of CSP to verify authentication protocols
-
B. Dutertre and S. Schneider. Using a PVS embedding of CSP to verify authentication protocols. In TPHOLS'97, 1997.
-
(1997)
TPHOLS'97
-
-
Dutertre, B.1
Schneider, S.2
-
15
-
-
0012796639
-
A security evaluation of IPSec
-
M. Blaze, J. Ioannides, A. Keromytis, and J. Smith, editors, Addison-Wesley, to appear
-
N. Ferguson and B. Schneier. A security evaluation of IPSec. In M. Blaze, J. Ioannides, A. Keromytis, and J. Smith, editors, The IPSec Papers. Addison-Wesley, to appear.
-
The IPSec Papers
-
-
Ferguson, N.1
Schneier, B.2
-
16
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
February
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42(2), February 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
17
-
-
0003161603
-
Fail-stop protocols: An approach to designing secure protocols
-
R. K. Iyer, M. Morganti, Fuchs W. K, and V. Gligor, editors, IEEE Computer Society
-
Li Gong and Paul Syverson. Fail-stop protocols: An approach to designing secure protocols. In R. K. Iyer, M. Morganti, Fuchs W. K, and V. Gligor, editors, Dependable Computing for Critical Applications 5, pages 79-100. IEEE Computer Society, 1998.
-
(1998)
Dependable Computing for Critical Applications
, vol.5
, pp. 79-100
-
-
Gong, L.1
Syverson, P.2
-
20
-
-
0024665744
-
Using Formal Methods to Analyze Encryption Protocols
-
Richard Kemmerer. Using Formal Methods to Analyze Encryption Protocols. IEEE Journal on Selected Areas in Communication, 7(4):448-457, 1989.
-
(1989)
IEEE Journal on Selected Areas in Communication
, vol.7
, Issue.4
, pp. 448-457
-
-
Kemmerer, R.1
-
22
-
-
84958052989
-
Probabilistic polynomial-time equivalence and security analysis
-
J. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods, Springer- Verlag September
-
P. Lincoln, J. MItchell, M. Mitchell, and A. Scedrov. Probabilistic polynomial-time equivalence and security analysis. In J. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods, pages 776-793. Springer- Verlag LLNCS 1709, September 1999.
-
(1999)
LLNCS
, vol.1709
, pp. 776-793
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
23
-
-
0026837069
-
An Automatic Search for Security Flaws in Key Management Schemes
-
D. Longley and S. Rigby. An Automatic Search for Security Flaws in Key Management Schemes. Computers and Security, 11(1):75-90, 1992.
-
(1992)
Computers and Security
, vol.11
, Issue.1
, pp. 75-90
-
-
Longley, D.1
Rigby, S.2
-
24
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software - Concepts and Tools, 17:93-102, 1996.
-
(1996)
Software - Concepts and Tools
, vol.17
, pp. 93-102
-
-
Lowe, G.1
-
26
-
-
0003418425
-
-
Request for Comments 2408, Network Working Group, November
-
D. Maughan, M. Schertler, M. Schneider, and J. Turner. Internet security association and key management protocol (ISAKMP). Request for Comments 2408, Network Working Group, November 1998. Available at http://www.ietf.org/html.charters/ipsec-charter.html.
-
(1998)
Internet Security Association and Key Management Protocol (ISAKMP)
-
-
Maughan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
-
27
-
-
0342880800
-
Applying Formal Methods to the Analysis of a Key Management Protocol
-
C. Meadows. Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security, 1:5-53, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
28
-
-
12744257762
-
Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches
-
Springer-Verlag, September
-
C. Meadows. Analyzing the Needham-Schroeder public-key protocol: A comparison of two approaches. In Computer Security - ESORICS 96, pages 355-364. Springer- Verlag, September 1996.
-
(1996)
Computer Security - ESORICS 96
, pp. 355-364
-
-
Meadows, C.1
-
29
-
-
84940106630
-
Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
-
IEEE Computer Society Press, May
-
C. Meadows. Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer. In Proceedings of the 1999 Symposium on Security and Privacy. IEEE Computer Society Press, May 1999.
-
(1999)
Proceedings of the 1999 Symposium on Security and Privacy
-
-
Meadows, C.1
-
30
-
-
0032664157
-
A formal framework and evaluation method for network denial of service
-
IEEE Computer Society Press, June
-
C. Meadows. A formal framework and evaluation method for network denial of service. In Proceedings of the 12th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1999.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop
-
-
Meadows, C.1
-
31
-
-
84958035071
-
A formal specification of requirements for payment in the SET protocol
-
Proceedings of Financial Cryptography ' 98. Springer-Verlag
-
C. Meadows and P. Syverson. A formal specification of requirements for payment in the SET protocol. In Proceedings of Financial Cryptography ' 98. Springer- Verlag LLNCS, 1998.
-
(1998)
LLNCS
-
-
Meadows, C.1
Syverson, P.2
-
33
-
-
0030084918
-
The NRL Protocol Analyzer: An overview
-
Catherine Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
37
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
December
-
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Communications of the ACM, 21(12):993-999, December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
38
-
-
0003892370
-
-
Request for Comments 2412, Network Working Group, November
-
H. Orman. The OAKLEY key determination protocol. Request for Comments 2412, Network Working Group, November 1998. Available at http://www.ietf.org/html.charters/ipsec-charter.html.
-
(1998)
The OAKLEY Key Determination Protocol
-
-
Orman, H.1
-
40
-
-
0030696539
-
Mechanized proofs for a recursive authentication protocol
-
IEEE Computer Society Press, June
-
L. Paulson. Mechanized proofs for a recursive authentication protocol. In Proceedings of the 10th Computer Security Foundations Workshop, pages 84-95. IEEE Computer Society Press, June 1997.
-
(1997)
Proceedings of the 10th Computer Security Foundations Workshop
, pp. 84-95
-
-
Paulson, L.1
-
41
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
42
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
June
-
M. Reiter and A. Rubin. Crowds: Anonymity for web transactions. ACM TISSEC, June 1999.
-
(1999)
ACM TISSEC
-
-
Reiter, M.1
Rubin, A.2
-
43
-
-
0003007912
-
Athena: An automatic checker for security protocol analysis
-
IEEE Computer Society Press, June
-
D. Song. Athena: An automatic checker for security protocol analysis. In Proceedings of 12th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, June 1999.
-
(1999)
Proceedings of 12th IEEE Computer Security Foundations Workshop
-
-
Song, D.1
-
44
-
-
84963600485
-
A bound on attacks on authentication protocols
-
July
-
S. Stoller. A bound on attacks on authentication protocols. presented at 1999 Workshop on Formal Methods and Security Protocols, available at http://www.cs.indiana.edu/hyplan/stoller/, July 1999.
-
(1999)
1999 Workshop on Formal Methods and Security Protocols
-
-
Stoller, S.1
-
47
-
-
84924758404
-
Group principals and the formalization of anonymity
-
J. Wing, J.Woodcock, and J. Davies, editors, FM'99 - Formal Methods, Springer- Verlag
-
P. Syverson and S. Stubblebine. Group principals and the formalization of anonymity. In J. Wing, J.Woodcock, and J. Davies, editors, FM'99 - Formal Methods, pages 814-833. Springer- Verlag LLNCS 1708, 1999.
-
(1999)
LLNCS
, vol.1708
, pp. 814-833
-
-
Syverson, P.1
Stubblebine, S.2
-
48
-
-
0027227136
-
A Logical Language for Specifying Cryptographic Protocol Requirements
-
IEEE Computer Society Press, Los Alamitos, California
-
Paul Syverson and Catherine Meadows. A Logical Language for Specifying Cryptographic Protocol Requirements. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pages 165-177. IEEE Computer Society Press, Los Alamitos, California, 1993.
-
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy
, vol.1993
, pp. 165-177
-
-
Syverson, P.1
Meadows, C.2
-
54
-
-
0032669524
-
Fixing a security flaw in IKE protocols
-
June
-
J. Zhou. Fixing a security flaw in IKE protocols. Electronics Letters, 35(13):1072-1073, June 1999.
-
(1999)
Electronics Letters
, vol.35
, Issue.13
, pp. 1072-1073
-
-
Zhou, J.1
|