-
2
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1):1-70, 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
0002885224
-
Prudent engineering practice for cryptographic protocols
-
M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 6-15
-
-
Abadi, M.1
Needham, R.2
-
5
-
-
0032670195
-
Authentication via localized names
-
IEEE press
-
C. Bodei, P. Degano, R. Focardi, and C. Priami. Authentication via localized names. In Proceedings of CSFW'99, pages 98-110. IEEE press, 1999.
-
(1999)
Proceedings of CSFW'99
, pp. 98-110
-
-
Bodei, C.1
Degano, P.2
Focardi, R.3
Priami, C.4
-
9
-
-
0032659620
-
CVS: A compiler for the analysis of cryptographic protocols
-
IEEE press
-
A. Durante, R. Focardi, and R. Gorrieri. CVS: A compiler for the analysis of cryptographic protocols. In Proceedings of CSFW'99, pages 203-212. IEEE press, 1999.
-
(1999)
Proceedings of CSFW'99
, pp. 203-212
-
-
Durante, A.1
Focardi, R.2
Gorrieri, R.3
-
10
-
-
84974776068
-
A classification of security properties for process algebras
-
R. Focardi and R. Gorrieri. A classification of security properties for process algebras. Journal of Computer Security, 3(1):5-33, 1994/1995.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.1
, pp. 5-33
-
-
Focardi, R.1
Gorrieri, R.2
-
11
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
September
-
R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), September 1997.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
-
-
Focardi, R.1
Gorrieri, R.2
-
12
-
-
0033725594
-
Information flow analysis in a discrete- time process algebra
-
IEEE Press. To appear
-
R. Focardi, R. Gorrieri, and F. Martinelli. Information flow analysis in a discrete- time process algebra. In Proceedings of CSFW'00, 2000. IEEE Press. To appear.
-
(2000)
Proceedings of CSFW'00
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
20
-
-
0003130993
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
LNCS
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Proceedings of TACAS'96, pages 146-166. LNCS 1055, 1996.
-
(1996)
Proceedings of TACAS'96
, vol.1055
, pp. 146-166
-
-
Lowe, G.1
-
22
-
-
84892805082
-
-
MasterCard, November, Draft Version 1.2
-
MasterCard. Secure electronic payment protocol, November 1995. Draft Version 1.2.
-
(1995)
Secure Electronic Payment Protocol
-
-
-
25
-
-
0031633214
-
Formal analysis of a non-repudiation protocol
-
IEEE Press
-
S. Schneider. Formal analysis of a non-repudiation protocol. In Proceedings of CSFW'98, pages 54-65. IEEE Press, 1998.
-
(1998)
Proceedings of CSFW'98
, pp. 54-65
-
-
Schneider, S.1
-
28
-
-
0026630927
-
Authentication for distributed systems
-
T. Y. C. Woo and S. S. Lam. Authentication for distributed systems. IEEE Computer, 25(1):39-51, 1992.
-
(1992)
IEEE Computer
, vol.25
, Issue.1
, pp. 39-51
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
29
-
-
84923989670
-
Authentication revised
-
T. Y. C. Woo and S. S. Lam. Authentication revised. IEEE Computer, 25(3):10, 1992.
-
(1992)
IEEE Computer
, vol.25
, Issue.3
, pp. 10
-
-
Woo, T.Y.C.1
Lam, S.S.2
|