-
1
-
-
84883268548
-
-
Research Report 67, Digital Systems Research Center, October 1990. Revised July
-
M. Abadi, M. Burrows, C. Kaufman, and B. Lampson. Authentication and delegation with smart-cards. Research Report 67, Digital Systems Research Center, October 1990. Revised July, 1992. 69
-
(1992)
Authentication and Delegation with Smart-Cards
, pp. 69
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
An extended version of this paper appears as Research Report 149, Digital Equipment Corporation Systems Research Center, January 1998. An early presentation appears in [AG97]. 113
-
[AG99] Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 143:1–70, 1999. An extended version of this paper appears as Research Report 149, Digital Equipment Corporation Systems Research Center, January 1998. An early presentation appears in [AG97]. 113
-
(1999)
Information and Computation
, vol.143
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84957714601
-
-
D. Coppersmith, editor, Advances in Cryptology — CRYPTO ’95, Springer-Verlag, LNCS 963, August 1995. 107, 109
-
[AN95] Ross Anderson and Roger Needham. Robustness principles for public key protocols. In D. Coppersmith, editor, Advances in Cryptology — CRYPTO ’95, pages 236–247. Springer-Verlag, LNCS 963, August 1995. 107, 109
-
Robustness Principles for Public Key Protocols
, pp. 236-247
-
-
Anderson, R.1
Needham, R.2
-
6
-
-
0002885224
-
Prudent engineering practices for cryptographic protocols
-
January 1996. A preliminary version appeared as [AN94]. 106
-
[AN96] Martín Abadi and Roger Needham. Prudent engineering practices for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6–15, January 1996. A preliminary version appeared as [AN94]. 106
-
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
7
-
-
85045348668
-
-
[Ano] The anonymizer. http://www.anonymizer.com/.128
-
-
-
-
8
-
-
35048895107
-
Reconciling two views of cryptographic protocols (The compuational soundness of formal encryption
-
Springer-Verlag, LNCS
-
[AR00] Martín Abadi and Phillip Rogaway. Reconciling two views of cryptographic protocols (the compuational soundness of formal encryption. In IFIP International Conference on Theoretical Computer Science (IFIP TCS2000). Springer-Verlag, LNCS, 2000. 128
-
(2000)
IFIP International Conference on Theoretical Computer Science (IFIP TCS2000)
, pp. 128
-
-
Abadi, M.1
Rogaway, P.2
-
10
-
-
85031620050
-
A semantics for a logic of authentication
-
ACM Press, August 1991. 67, 76, 79, 88, 95, 120, 124, 125
-
[AT91] Martín Abadi and Mark R. Tuttle. A semantics for a logic of authentication. In Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing, pages 201–216. ACM Press, August 1991. 67, 76, 79, 88, 95, 120, 124, 125
-
Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing
, pp. 201-216
-
-
Abadi, M.1
Tuttle, M.R.2
-
11
-
-
0004019982
-
Authentication: A practical study of belief in action
-
Morgan Kaufmann, March 1988. Also presented at The Computer Security Foundations Workshop, Franconia, NH, June 1988. 66
-
[BAN88] Michael Burrows, Martín Abadi, and Roger Needham. Authentication: A practical study of belief in action. In M. Vardi, editor, Proceedings of the Second Conference on Theoretical Aspects of Reasoning About Knowledge (Tark), pages 325–342. Morgan Kaufmann, March 1988. Also presented at The Computer Security Foundations Workshop, Franconia, NH, June 1988. 66
-
Proceedings of the Second Conference on Theoretical Aspects of Reasoning about Knowledge
, pp. 325-342
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
12
-
-
0004215976
-
-
Research Report 39, Digital Systems Research Center, February 1989. Revised Feb. 22, 1990. 63, 66, 67, 68, 69, 70, 85, 87, 93, 95, 98, 101, 102
-
[BAN89a] Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Research Report 39, Digital Systems Research Center, February 1989. Revised Feb. 22, 1990. 63, 66, 67, 68, 69, 70, 85, 87, 93, 95, 98, 101, 102
-
A Logic of Authentication
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
13
-
-
0024880585
-
A logic of authentication
-
[BAN89b] Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Operating Systems Review, 23(5):1–13,
-
Operating Systems Review
, vol.23
, Issue.5
, pp. 1-13
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
14
-
-
85045306090
-
-
December 1989. This issue of OSR: Proceedings of the Twelfth ACM Symposium on Operating Systems Principles (SOSP), Litchfield Park, Arizona, December 1989. 66
-
December 1989. This issue of OSR: Proceedings of the Twelfth ACM Symposium on Operating Systems Principles (SOSP), Litchfield Park, Arizona, December 1989. 66
-
-
-
-
15
-
-
0000523051
-
A logic of authentication. Proceedings of the Royal Society of London
-
December 1989. 66
-
[BAN89c] Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Proceedings of the Royal Society of London. Series A, Mathematical and Physical Sciences, 426(1871):233–271, December 1989. 66
-
Series A, Mathematical and Physical Sciences
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
16
-
-
0025386404
-
A logic of authentication
-
Feb 1990. 66
-
[BAN90a] Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18–36, Feb 1990. 66
-
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
17
-
-
0011936788
-
Rejoinder to nessett
-
April 1990. 75
-
[BAN90b] Michael Burrows, Martín Abadi, and Roger Needham. Rejoinder to nessett. Operating Systems Review, 24(2):39–40, April 1990. 75
-
Operating Systems Review
, vol.24
, Issue.2
, pp. 39-40
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
18
-
-
84948705711
-
The scope of a logic of authentication
-
Feigenbaum and M. Merritt, editors, Distributed Computing and Cryptography, AMS and ACM, 1990. Proceedings of a DIMACS workshop, October 1989. 66
-
[BAN90c] Michael Burrows, Martín Abadi, and Roger Needham. The scope of a logic of authentication. In J. Feigenbaum and M. Merritt, editors, Distributed Computing and Cryptography, volume 2 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, pages 119–126. AMS and ACM, 1990. Proceedings of a DIMACS workshop, October 1989. 66
-
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.2
, pp. 119-126
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
19
-
-
0025641513
-
A logic of communication in hostile environment
-
IEEE CS Press, June 1990. 97, 98
-
[Bie90] Pierre Bieber. A logic of communication in hostile environment. In Proceedings of the Computer Security Foundations Workshop III, pages 14–22. IEEE CS Press, June 1990. 97, 98
-
Proceedings of the Computer Security Foundations Workshop III
, pp. 14-22
-
-
Bieber, P.1
-
21
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
ACM Press, November 1993. 108
-
[BM93] Steve Bellovin and Michael Merritt. Augmented encrypted key exchange: a password-based protocol secure against dictionary attacks and password file compromise. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 244–250. ACM Press, November 1993. 108
-
Proceedings of the 1St ACM Conference on Computer and Communications Security
, pp. 244-250
-
-
Bellovin, S.1
Merritt, M.2
-
22
-
-
84944035753
-
-
F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Computer Security – ESORICS 2000, Springer-Verlag, LNCS 1895, October 2000. 127
-
[BMPT00] Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, and Piero Tramon-tano. Formal verification of cardholder registration in SET. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Computer Security – ESORICS 2000, pages 159–174. Springer-Verlag, LNCS 1895, October 2000. 127
-
Formal Verification of Cardholder Registration in SET
, pp. 159-174
-
-
Bella, G.1
Massacci, F.2
Paulson, L.C.3
Tramon-Tano, P.4
-
23
-
-
0029718781
-
A HOL extension of GNY for automatically analyzing cryptographic protocols
-
IEEE CS Press, June 1996. 112
-
[Bra96] Stephen H. Brackin. A HOL extension of GNY for automatically analyzing cryptographic protocols. In 9th IEEE Computer Security Foundations Workshop, pages 62–76. IEEE CS Press, June 1996. 112
-
9Th IEEE Computer Security Foundations Workshop
, pp. 62-76
-
-
Brackin, S.H.1
-
24
-
-
19144371730
-
Automatic formal analyses of two large commercial protocols
-
September 1997. Available at
-
[Bra97] Stephen H. Brackin. Automatic formal analyses of two large commercial protocols. In DIMACS Workshop on Design and Formal Verification of Security Protocols, September 1997. Available at http://dimacs.rutgers.edu/Workshops/Security/program2/brackin.html. 112, 127
-
DIMACS Workshop on Design and Formal Verification of Security Protocols
, pp. 112
-
-
Brackin, S.H.1
-
25
-
-
0031629945
-
Evaluating and improving protocol analysis by automatic proof
-
IEEE CS Press, 1998. 112
-
[Bra98] Stephen H. Brackin. Evaluating and improving protocol analysis by automatic proof. In 11th IEEE Computer Security Foundations Workshop, pages 138– 152. IEEE CS Press, 1998. 112
-
11Th IEEE Computer Security Foundations Workshop
, pp. 138-152
-
-
Brackin, S.H.1
-
32
-
-
85045303665
-
-
To appear as a technical report, Department of Computer Science, Stanford University
-
+ ] Iliano Cervesato, Nancy Durgin, Patrick Lincoln, John Mitchell, and Andre Scedrov. A comparison between strand spaces and transition systems for the specification of security protocols. To appear as a technical report, Department of Computer Science, Stanford University. 118
-
A Comparison between Strand Spaces and Transition Systems for the Specification of Security Protocols
, pp. 118
-
-
Cervesato, I.1
Durgin, N.2
Lincoln, P.3
Mitchell, J.4
Scedrov, A.5
-
33
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, R. L. Rivest, and A. T. Sherman, editors
-
[Cha83] David Chaum. Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, and A. T. Sherman, editors, Advances in Cryptology – Proceedings of Crypto 82, pages 199–203, 1983. 107
-
(1983)
Advances in Cryptology – Proceedings of Crypto 82
, vol.107
, pp. 199-203
-
-
Chaum, D.1
-
34
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and receiver untraceability
-
[Cha88] David Chaum. The dining cryptographers problem: Unconditional sender and receiver untraceability. Journal of Cryptology, 1(1):65–75, 1988. 128
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
36
-
-
0003568551
-
-
Version 1.0, nov 1997. Available at, under the link “Security Protocols Review”. 87, 93, 102, 103, 112
-
[CJ97] John Clark and Jeremy Jacob. A survey of authentication protocol literature: Version 1.0, nov 1997. Available at www-users.cs.york.ac.uk/~jac/ under the link “Security Protocols Review”. 87, 93, 102, 103, 112
-
A Survey of Authentication Protocol Literature
-
-
Clark, J.1
Jacob, J.2
-
37
-
-
0033701785
-
Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols
-
IEEE CS Press, May 2000. 113
-
[CJ00] John Clark and Jeremy Jacob. Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols. In Proceedings of the IEEE Symposium on Security and Privacy, pages 82–95. IEEE CS Press, May 2000. 113
-
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 82-95
-
-
Clark, J.1
Jacob, J.2
-
39
-
-
85045306936
-
-
Crowds. http://www.research.att.com/projects/crowds/. 128
-
-
-
Crowds1
-
40
-
-
84958612917
-
Efficient group signature schemes for large groups
-
B. Kaliski, editor, Springer-Verlag, LNCS 1294, 1997. 126
-
[CS97] Jan L. Camenisch and Markus A. Stadler. Efficient group signature schemes for large groups. In B. Kaliski, editor, Advances in Cryptology – CRYPTO ’97, pages 410–424. Springer-Verlag, LNCS 1294, 1997. 126
-
Advances in Cryptology – CRYPTO ’97
, pp. 410-424
-
-
Camenisch, J.L.1
Stadler, M.A.2
-
41
-
-
85024290278
-
-
D. W. Davies, editor, Springer-Verlag, LNCS 547, 1991. 126
-
[CvH91] David Chaum and Eugène van Heyst. Group signature. In D. W. Davies, editor, Advances in Cryptology – EUROCRYPT ’91, pages 257–265. Springer-Verlag, LNCS 547, 1991. 126
-
Group Signature
, vol.91
, pp. 257-265
-
-
Chaum, D.1
Vanheyst, E.2
-
42
-
-
0033719708
-
C3po: A tool for automatic sound cryptographic protocol analysis
-
IEEE CS Press, June 2000. 83, 113
-
[Dek00] Anthony H. Dekker. C3po: a tool for automatic sound cryptographic protocol analysis. In 13th IEEE Computer Security Foundations Workshop, pages 77– 87. IEEE CS Press, June 2000. 83, 113
-
13Th IEEE Computer Security Foundations Workshop
, pp. 77-87
-
-
Dekker, A.H.1
-
43
-
-
0003406377
-
-
Prentice Hall
-
[DH99] Naganand Doraswamy and Dan Harkins. IPSEC: The New Security Standard for the Internet, Intranets, and Virtual Private Networks. Prentice Hall, 1999. 76, 125
-
(1999)
IPSEC: The New Security Standard for The Internet, Intranets, and Virtual Private Networks
, vol.76
, pp. 125
-
-
Doraswamy, N.1
Harkins, D.2
-
45
-
-
84976665942
-
Timestamps in key distribution protocols
-
August 1981. 73, 92
-
[DS81] Dorothy E. Denning and Giovanni Maria Sacco. Timestamps in key distribution protocols. Communications of the ACM, 24(8):533–536, August 1981. 73, 92
-
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
46
-
-
1542593353
-
Authentication and authenticated key exchanges
-
[DvOW92] Whitfield Diffie, Paul C. van Oorschot, and Michael J. Wiener. Authentication and authenticated key exchanges. Designs, Codes, and Cryptography, 2:107–125, 1992. 104
-
Designs, Codes, and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Van, P.C.2
Oorschotwiener, M.J.3
-
47
-
-
0020720357
-
On the security of public-key protocols
-
March 1983. 64, 123
-
[DY83] Danny Dolev and Andrew C. Yao. On the security of public-key protocols. IEEE Transactions on Information Theory, 2(29):198–208, March 1983. 64, 123
-
IEEE Transactions on Information Theory
, vol.2
, Issue.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
48
-
-
84944070422
-
Analysing time dependent security properties in CSP using PVS
-
F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Springer-Verlag, LNCS 1895, October
-
[ES00] Neil Evans and Steve Schneider. Analysing time dependent security properties in CSP using PVS. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Computer Security – ESORICS 2000, pages 222–237. Springer-Verlag, LNCS 1895, October 2000. 103
-
(2000)
Computer Security – ESORICS 2000
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
49
-
-
85045344445
-
-
[FHMV95] Ronald Fagin, Joseph Y. Halpern, Yoram Moses, and Moshe Y. Vardi. Reasoning About Knowledge. MIT Press, 1995. 120, 121, 128
-
(1995)
Reasoning about Knowledge
, vol.120
, Issue.121
, pp. 128
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
50
-
-
85045328839
-
-
[Fre] Freedom. http://www.freedom.net/. 128
-
Freedom
, pp. 128
-
-
-
51
-
-
0025023289
-
Reasoning about Belief in Cryptographic Protocols
-
IEEE Computer Society Press, 1990. 76, 88, 89, 95
-
[GNY90] Li Gong, Roger Needham, and Raphael Yahalom. Reasoning about Belief in Cryptographic Protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 234–248. IEEE Computer Society Press, 1990. 76, 88, 89, 95
-
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Roger Needham, L.G.1
Yahalom, R.2
-
54
-
-
19144370194
-
On the verification of cryptographic protocols - a tale of two committees
-
Steve Schneider and Peter Ryan, editors, Elsevier Science Publishers
-
[Gol00] Dieter Gollmann. On the verification of cryptographic protocols - a tale of two committees. In Steve Schneider and Peter Ryan, editors, Electronic Notes in Theoretical Computer Science, volume 32. Elsevier Science Publishers, 2000. 102, 105
-
(2000)
Electronic Notes in Theoretical Computer Science
, vol.32
, pp. 105
-
-
Gollmann, D.1
-
55
-
-
0003161603
-
Fail-stop protocols: An approach to designing secure protocols
-
R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors, IEEE Computer Society Press, 1998. 109
-
[GS98] Li Gong and Paul Syverson. Fail-stop protocols: An approach to designing secure protocols. In R. K. Iyer, M. Morganti, W. K. Fuchs, and V. Gligor, editors, Dependable Computing for Critical Applications 5, pages 79–100. IEEE Computer Society Press, 1998. 109
-
Dependable Computing for Critical Applications
, vol.5
, pp. 79-100
-
-
Li, G.1
Syverson, P.2
-
57
-
-
0001924088
-
A model for secure protocols and their composition
-
January 1996. 127
-
[HT96] N. Heintze and J. D. Tygar. A model for secure protocols and their composition. IEEE Transactions on Software Engineering, 22(1):16–30, January 1996. 127
-
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 16-30
-
-
Heintze, N.1
Tygar, J.D.2
-
59
-
-
0029210095
-
Reasoning about accountability in protocols for electronic commerce
-
IEEE CS Press, May 1995. 127
-
[Kai95] Rajashekar Kailar. Reasoning about accountability in protocols for electronic commerce. In Proceedings of the IEEE Symposium on Security and Privacy, pages 236–250. IEEE CS Press, May 1995. 127
-
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 236-250
-
-
Kailar, R.1
-
60
-
-
33745689203
-
Accountability in electronic commerce protocols
-
[Kai96] Rajashekar Kailar. Accountability in electronic commerce protocols. IEEE Transactions on Software Engineering, 5(22), May 1996. 127
-
(1996)
IEEE Transactions on Software Engineering
, vol.5
, Issue.22
, pp. 127
-
-
Kailar, R.1
-
61
-
-
0023248072
-
Using formal verification techniques to analyze cryptographic protocols
-
IEEE CS Press, May 1987. 63
-
[Kem87] Richard A. Kemmerer. Using formal verification techniques to analyze cryptographic protocols. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 134–139. IEEE CS Press, May 1987. 63
-
Proceedings of the 1987 IEEE Symposium on Security and Privacy
, pp. 134-139
-
-
Kemmerer, R.A.1
-
62
-
-
84958771467
-
A sound logic for analysing electronic commerce protocols
-
J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Springer-Verlag, LNCS 1485, September 1998. 127
-
[KN98] Volker Kessler and Heike Neumann. A sound logic for analysing electronic commerce protocols. In J.-J. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, Computer Security – ESORICS 98, pages 345–360. Springer-Verlag, LNCS 1485, September 1998. 127
-
Computer Security – ESORICS
, vol.98
, pp. 345-360
-
-
Kessler, V.1
Neumann, H.2
-
63
-
-
33646783922
-
A game approach to the verification of exchange protocols: Application to non-repudiation protocols
-
P. Degano, editor, July 2000. 127
-
[KR00] Steve Kremer and Jean-François Raskin. A game approach to the verification of exchange protocols: Application to non-repudiation protocols. In P. Degano, editor, First Workshop on Issues in the Theory of Security – WITS’00, pages 93–98, July 2000. 127
-
First Workshop on Issues in the Theory of Security – WITS’00
, pp. 93-98
-
-
Kremer, S.1
Raskin, J.-F.2
-
64
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
July 1978. 109
-
[Lam78] Leslie Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558–565, July 1978. 109
-
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
66
-
-
0030708255
-
A herarchy of authentication specifications
-
IEEE Computer Society Press, June 1997. 100, 101, 102, 103
-
[Low97] Gavin Lowe. A herarchy of authentication specifications. In Proceedings of the 10th IEEE Computer Security Foundations Workshop (CSFW9), pages 31–43. IEEE Computer Society Press, June 1997. 100, 101, 102, 103
-
Proceedings of the 10Th IEEE Computer Security Foundations Workshop (CSFW9)
, pp. 31-43
-
-
Lowe, G.1
-
67
-
-
0023295108
-
The Interrogator: Protocol security analysis
-
[MCF87] Jonathan K. Millen, Sidney C. Clark, and Sheryl B. Freedman. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, 13(2):274–288, 1987. 63
-
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 274-288
-
-
Millen, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
68
-
-
85063350588
-
A model of computation for the NRL Protocol Analyzer
-
IEEE CS Press, June 1994. 114, 116, 118
-
[Mea94] Catherine Meadows. A model of computation for the NRL Protocol Analyzer. In Proceedings of the 7th Computer Security Foundations Workshop, pages 84–89. IEEE CS Press, June 1994. 114, 116, 118
-
Proceedings of the 7Th Computer Security Foundations Workshop
, pp. 84-89
-
-
Meadows, C.1
-
69
-
-
0030084918
-
The NRL Protocol Analyzer: An overview
-
February 1996. 114, 116
-
[Mea96] Catherine Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2):113–131, February 1996. 114, 116
-
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
70
-
-
0032630725
-
Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
-
IEEE Computer Society Press, May 1999. 128
-
[Mea99a] C. Meadows. Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, May 1999. 128
-
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Meadows, C.1
-
72
-
-
0012795935
-
Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
-
P. Degano, editor, July 2000. 126
-
[Mea00a] Catherine Meadows. Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives. In P. Degano, editor, First Workshop on Issues in the Theory of Security – WITS’00, pages 87–92, July 2000. 126
-
First Workshop on Issues in the Theory of Security – WITS’00
, pp. 87-92
-
-
Meadows, C.1
-
73
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Computer Society Press, January 2000. 125
-
[Mea00b] Catherine Meadows. Open issues in formal methods for cryptographic protocol analysis. In DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition, volume I, pages 237–250. IEEE Computer Society Press, January 2000. 125
-
DISCEX 2000: Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 237-250
-
-
Meadows, C.1
-
74
-
-
0035075103
-
A cost-based framework for analysis of denial of service in networks
-
Forthcoming. A preliminary version of portions of this work appeared in [Mea99b]. 126
-
[Mea01] Catherine Meadows. A cost-based framework for analysis of denial of service in networks. Journal of Computer Security, 2001. Forthcoming. A preliminary version of portions of this work appeared in [Mea99b]. 126
-
(2001)
Journal of Computer Security
-
-
Meadows, C.1
-
77
-
-
0021190844
-
The Interrogator: A tool for cryptographic protocol security
-
Oakland, CA, April 1984. IEEE Computer Society Press. 63
-
[Mil84] Jonathan K. Millen. The Interrogator: A tool for cryptographic protocol security. In Proceedings of the 1984 IEEE Symposium on Security and Privacy, pages 134–141, Oakland, CA, April 1984. IEEE Computer Society Press. 63
-
Proceedings of the 1984 IEEE Symposium on Security and Privacy
, pp. 134-141
-
-
Millen, J.K.1
-
80
-
-
84958035071
-
-
R. Hirschfeld, editor, Financial Cryptography, FC’98, Springer-Verlag, LNCS 1465, 1998. 117, 127
-
[MS98] C. Meadows and P. Syverson. A formal specification of requirements for payment trnasactions in the SET protocol. In R. Hirschfeld, editor, Financial Cryptography, FC’98, pages 122–140. Springer-Verlag, LNCS 1465, 1998. 117, 127
-
A Formal Specification of Requirements for Payment Trnasactions in the SET Protocol
, pp. 122-140
-
-
Meadows, C.1
Syverson, P.2
-
81
-
-
85045348666
-
-
CRC Press
-
[MvOV97] Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 1997. 64, 80, 89
-
(1997)
Handbook of Applied Cryptography
, vol.64
, Issue.80
, pp. 89
-
-
Menezes, A.J.1
Van, P.C.2
Oorschotvanstone, S.A.3
-
82
-
-
0025405980
-
A critique of the burrows, abadi, and needham logic
-
April 1990. 73, 74
-
[Nes90] D. M. Nessett. A critique of the burrows, abadi, and needham logic. Operating Systems Review, 24(2):35–38, April 1990. 73, 74
-
Operating Systems Review
, vol.24
, Issue.2
, pp. 35-38
-
-
Nessett, D.M.1
-
83
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
1978. 65, 101, 102
-
[NS78] R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993–999, 1978. 65, 101, 102
-
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
85
-
-
84890935025
-
-
[Oni] Onion routing. http://www.onion-router.net/. 128
-
Onion Routing
-
-
-
87
-
-
0033682447
-
Looking for diamonds in the desert — extending automatic protocol generation to three-party authentication and key agreement
-
IEEE CS Press, June 2000. 113
-
[PS00] Adrian Perrig and Dawn Song. Looking for diamonds in the desert — extending automatic protocol generation to three-party authentication and key agreement. In 13th IEEE Computer Security Foundations Workshop, pages 64–76. IEEE CS Press, June 2000. 113
-
13Th IEEE Computer Security Foundations Workshop
, pp. 64-76
-
-
Perrig, A.1
Song, D.2
-
89
-
-
0024714097
-
Integrating security in a large distributed system
-
August 1989. 102
-
[Sat89] M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 15(3):247–280, August 1989. 102
-
ACM Transactions on Computer Systems
, vol.15
, Issue.3
, pp. 247-280
-
-
Satyanarayanan, M.1
-
90
-
-
85045301117
-
-
John Wiley & Sons
-
[Sch96] Bruce Schneier. Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, 1996. 64, 80, 107
-
(1996)
Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C
, vol.64
, Issue.80
, pp. 107
-
-
Schneier, B.1
-
93
-
-
1442341305
-
Formal requirements for key distribution protocols
-
A. De Santis, editor, Springer-Verlag, LNCS 950, 1994. 117
-
[SM94] P. Syverson and C. Meadows. Formal requirements for key distribution protocols. In A. De Santis, editor, Advances in Cryptology — EUROCRYPT ’94, pages 32–331. Springer-Verlag, LNCS 950, 1994. 117
-
Advances in Cryptology — EUROCRYPT
, vol.94
, pp. 32-331
-
-
Syverson, P.1
Meadows, C.2
-
94
-
-
0001937830
-
A formal language for cryptographic protocol requirements
-
January 1996. 114, 116, 117
-
[SM96] P. Syverson and C. Meadows. A formal language for cryptographic protocol requirements. Designs, Codes, and Cryptography, 7(1 and 2):27–59, January 1996. 114, 116, 117
-
Designs, Codes, and Cryptography
, vol.7
, Issue.1-2
, pp. 27-59
-
-
Syverson, P.1
Meadows, C.2
-
97
-
-
0032678887
-
Thena: A new efficient automatic checker for security protocol analysis
-
Mordano, Italy, June 1999. IEEE Computer Society Press. 118
-
[Son99] Dawn Song. Athena: a new efficient automatic checker for security protocol analysis. In Proceedings of the Twelth IEEE Computer Security Foundations Workshop, pages 192–202, Mordano, Italy, June 1999. IEEE Computer Society Press. 118
-
Proceedings of the Twelth IEEE Computer Security Foundations Workshop
, pp. 192-202
-
-
Song, D.1
-
98
-
-
84949756689
-
CSP and anonymity
-
E. Bertino, H. Kurth, G. Martella, and E. Montolivio, editors, Springer Verlag, LNCS 1146, 1996. 129
-
[SS96] Steve Schneider and Abraham Sidiropoulos. CSP and anonymity. In E. Bertino, H. Kurth, G. Martella, and E. Montolivio, editors, Computer Security – ESORICS 96, pages 198–218. Springer Verlag, LNCS 1146, 1996. 129
-
Computer Security – ESORICS 96
, pp. 198-218
-
-
Schneider, S.1
Sidiropoulos, A.2
-
99
-
-
84924758404
-
-
J. M. Wing, J. Woodcock, and J. Davies, editors, FM’99 – Formal Methods, Springer-Verlag, LNCS 1708, 1999. 128, 129
-
[SS99] Paul Syverson and Stuart Stubblebine. Group principals and the formalization of anonymity. In J. M. Wing, J. Woodcock, and J. Davies, editors, FM’99 – Formal Methods, Vol. I, pages 814–833. Springer-Verlag, LNCS 1708, 1999. 128, 129
-
Group Principals and the Formalization of Anonymity
, vol.1
, pp. 814-833
-
-
Syverson, P.1
Stubblebine, S.2
-
101
-
-
0027929693
-
On unifying some cryptographic protocols
-
IEEE CS Press, May 1994. 77, 78, 120, 125
-
[SvO94] Paul F. Syverson and Paul C. van Oorschot. On unifying some cryptographic protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 14–28. IEEE CS Press, May 1994. 77, 78, 120, 125
-
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 14-28
-
-
Syverson, P.F.1
Vanoorschot, P.C.2
-
102
-
-
0003527653
-
-
NRL Publication 5540-227, Naval Research Lab, 1996. 77, 78, 79, 84, 85, 88, 95, 98, 120, 124, 125, 126
-
[SvO96] Paul F. Syverson and Paul C. van Oorschot. A unified cryptographic protocol logic. NRL Publication 5540-227, Naval Research Lab, 1996. 77, 78, 79, 84, 85, 88, 95, 98, 120, 124, 125, 126
-
A Unified Cryptographic Protocol Logic
-
-
Syverson, P.F.1
Vanoorschot, P.C.2
-
103
-
-
0029711077
-
An authentication logic supporting synchronization, revocation, and recency
-
ACM Press, March 1996. 127
-
[SW96] Stuart Stubblebine and Rebecca Wright. An authentication logic supporting synchronization, revocation, and recency. In 3rd ACM Conference on Computer and Communications Security (CCS’96), pages 95–105. ACM Press, March 1996. 127
-
3Rd ACM Conference on Computer and Communications Security (CCS’96)
, pp. 95-105
-
-
-
105
-
-
84974755213
-
Knowledge, belief, and semantics in the analysis of cryptographic protocols
-
[Syv92] Paul F. Syverson. Knowledge, belief, and semantics in the analysis of cryptographic protocols. Journal of Computer Security, 1(3,4):317–334, 1992. 76, 79
-
Journal of Computer Security
, vol.1
, Issue.3-4
, pp. 317-334
-
-
Syverson, P.F.1
-
106
-
-
0027750637
-
Adding time to a logic of authentication
-
November, 1993. ACM Press. 96, 98, 121
-
[Syv93a] Paul F. Syverson. Adding time to a logic of authentication. In Proceedings of the First ACM Conference on Computer and Communications Security, pages 97–101, November, 1993. ACM Press. 96, 98, 121
-
Proceedings of the First ACM Conference on Computer and Communications Security
, pp. 97-101
-
-
Syverson, P.F.1
-
107
-
-
0002796093
-
On Key Distribution Protocols for Repeated Authentication
-
October 1993. 93
-
[Syv93b] Paul F. Syverson. On Key Distribution Protocols for Repeated Authentication. Operating Systems Review, 27(4):24–30, October 1993. 93
-
Operating Systems Review
, vol.27
, Issue.4
, pp. 24-30
-
-
Syverson, P.F.1
-
108
-
-
85055796408
-
A taxonomy of replay attacks
-
IEEE CS Press, June 1994. 91, 92, 93, 95, 98
-
[Syv94] Paul Syverson. A taxonomy of replay attacks. In Proceedings of the Computer Security Foundations Workshop (CSFW7), pages 187–191. IEEE CS Press, June 1994. 91, 92, 93, 95, 98
-
Proceedings of the Computer Security Foundations Workshop (CSFW7)
, pp. 187-191
-
-
Syverson, P.1
-
109
-
-
0029721958
-
Limitations on design principles for public key protocols
-
IEEE Computer Society Press, May 1996. 107, 108
-
[Syv96] Paul Syverson. Limitations on design principles for public key protocols. In Proceedings of the IEEE Symposium on Security and Privacy, pages 62–72. IEEE Computer Society Press, May 1996. 107, 108
-
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 62-72
-
-
Syverson, P.1
-
110
-
-
85045348482
-
-
Workshop on Formal Methods and Security Protocols, Indianapolis, Indiana, June 1998
-
[Syv98] Paul F. Syverson. Relating two models of computation for security protocols. In Workshop on Formal Methods and Security Protocols, Indianapolis, Indiana, June 1998. Available at http://www.cs.bell-labs.com/who/nch/fmsp/program.html. 118
-
Relating Two Models of Computation for Security Protocols
, pp. 118
-
-
Syverson, P.F.1
-
111
-
-
0003277548
-
Towards a strand semantics for authentication logic
-
Proceedings of MFPS XV (S. Brookes, A. Jung, M. Mislove and A. Scedrov, eds.), New Orleans, LA, April 1999. 114, 118
-
[Syv00] Paul F. Syverson. Towards a strand semantics for authentication logic. Electronic Notes in Theoretical Computer Science, 20, 2000. Proceedings of MFPS XV (S. Brookes, A. Jung, M. Mislove and A. Scedrov, eds.), New Orleans, LA, April 1999. 114, 118
-
(2000)
Electronic Notes in Theoretical Computer Science
, vol.20
-
-
Syverson, P.F.1
-
112
-
-
85045318813
-
-
November 1997. 66, 114, 118, 121
-
[THG97] F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces. Technical report, The MITRE Corporation, November 1997. 66, 114, 118, 121
-
Strand Spaces. Technical Report, the MITRE Corporation
-
-
Javier Thayer Fábrega, F.1
Herzog, J.C.2
Guttman, J.D.3
-
113
-
-
0031640904
-
Honest ideals on strand spaces
-
IEEE Computer Society Press, 1998. 123
-
[THG98a] F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Honest ideals on strand spaces. In Proceedings of the 1998 IEEE Computer Security Foundations Workshop — CSFW’11, pages 66–77. IEEE Computer Society Press, 1998. 123
-
Proceedings of the 1998 IEEE Computer Security Foundations Workshop — CSFW
, vol.11
, pp. 66-77
-
-
Javier Thayer Fábrega, F.1
Herzog, J.C.2
Guttman, J.D.3
-
114
-
-
0031676397
-
Strand spaces: Why is a security protocol correct?
-
Oakland, CA, May 1998. IEEE Computer Society Press. 66, 114, 118
-
[THG98b] F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces: Why is a security protocol correct? In Proceedings of the 1998 IEEE Symposium on Security and Privacy, pages 160–171, Oakland, CA, May 1998. IEEE Computer Society Press. 66, 114, 118
-
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Javier Thayer Fábrega, F.1
Herzog, J.C.2
Guttman, J.D.3
-
115
-
-
0032671776
-
Mixed strand spaces
-
Mordano, Italy, June 1999. IEEE Computer Society Press. 128
-
[THG99a] F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Mixed strand spaces. In P. Syverson, editor, Proceedings of the 12th IEEE Computer Security Foundations Workshop — CSFW’99, pages 72–82, Mordano, Italy, June 1999. IEEE Computer Society Press. 128
-
Proceedings of the 12Th IEEE Computer Security Foundations Workshop — CSFW
, vol.99
, pp. 72-82
-
-
Javier Thayer Fábrega, F.1
Herzog, J.C.2
Guttman, J.D.3
-
116
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
[THG99b] F. Javier Thayer Fábrega, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces: Proving security protocols correct. Journal of Computer Security, 7(2,3):191–230, 1999. 119, 122, 123
-
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Javier Thayer Fábrega, F.1
Herzog, J.C.2
Guttman, J.D.3
-
117
-
-
0003537268
-
-
Y. Deswarte, G. Eizenberg, and J.-J. Quisquater, editors, Computer Security – ESORICS 92, Springer-Verlag, LNCS 648, November 1992. 108
-
[Tou92] Marie-Jeanne Toussaint. Separating the specification and implementation phases in cryptology. In Y. Deswarte, G. Eizenberg, and J.-J. Quisquater, editors, Computer Security – ESORICS 92, pages 77–102. Springer-Verlag, LNCS 648, November 1992. 108
-
Separating the Specification and Implementation Phases in Cryptology
, pp. 77-102
-
-
Toussaint, M.-J.1
-
119
-
-
0027735231
-
Extending cryptographic logics of belief to key agreement protocols
-
ACM Press, November 1993. 67, 76, 85, 88, 95, 98, 126
-
[vO93] Paul C. van Oorschot. Extending cryptographic logics of belief to key agreement protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security, pages 233–243. ACM Press, November 1993. 67, 76, 85, 88, 95, 98, 126
-
Proceedings of the 1St ACM Conference on Computer and Communications Security
, pp. 233-243
-
-
Oorschot, P.C.V.1
-
120
-
-
84949768259
-
Formal semantics for authentication logics
-
E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Springer-Verlag, LNCS 1146, September 1996. 78, 83, 113, 127
-
[WK96] Gabriele Wedel and Volker Kessler. Formal semantics for authentication logics. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Computer Security – ESORICS 96, pages 219–241. Springer-Verlag, LNCS 1146, September 1996. 78, 83, 113, 127
-
Computer Security – ESORICS
, vol.96
, pp. 219-241
-
-
Wedel, G.1
Kessler, V.2
-
121
-
-
84974746841
-
Optimality of asynchronous two-party secure data-exchange protocol
-
[Yah93] Raphael Yahalom. Optimality of asynchronous two-party secure data-exchange protocol. Journal of Computer Security, 2(2–3):191–209, 1993. 93
-
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 191-209
-
-
Yahalom, R.1
-
122
-
-
0039311188
-
Towards verification of non-repudiation protocols
-
T. Vickers J. Grundy, M. Schwenke, editor, Springer-Verlag, 1998. 127
-
[ZG98] Jianying Zhou and Dieter Gollmann. Towards verification of non-repudiation protocols. In T. Vickers J. Grundy, M. Schwenke, editor, International Refinement Workshop and Formal Methods Pacific 1998, pages 370–380. Springer-Verlag, 1998. 127
-
International Refinement Workshop and Formal Methods Pacific 1998
, pp. 370-380
-
-
Zhou, J.1
Gollmann, D.2
|