-
1
-
-
84891883665
-
Formal verification of security protocol implementations: A survey
-
M. Avalle, A. Pironti, and R. Sisto, "Formal verification of security protocol implementations: a survey," Formal Aspects of Computing, vol. 26, no. 1, pp. 99123, 2014.
-
(2014)
Formal Aspects of Computing
, vol.26
, Issue.1
, pp. 99123
-
-
Avalle, M.1
Pironti, A.2
Sisto, R.3
-
2
-
-
80455144511
-
The Java SPI framework for security protocol implementation
-
Vienna, Austria, Aug
-
M. Avalle, A. Pironti, R. Sisto, and D. Pozza, "The Java SPI framework for security protocol implementation," in the Sixth International Conference on Availability, Reliability and Security, pp. 746-751, Vienna, Austria, Aug. 2011.
-
(2011)
the Sixth International Conference on Availability, Reliability and Security
, pp. 746-751
-
-
Avalle, M.1
Pironti, A.2
Sisto, R.3
Pozza, D.4
-
3
-
-
84859450172
-
On the development and formalization of an extensible code generator for real life security protocols
-
Norfolk, USA, Apr
-
M. Backes, A. Buseniusl, and C. Hritcu, "On the development and formalization of an extensible code generator for real life security protocols," in Proceeding of The 4th International Conference on NASA Formal Methods, pp. 371-387, Norfolk, USA, Apr. 2012.
-
(2012)
Proceeding of The 4th International Conference on NASA Formal Methods
, pp. 371-387
-
-
Backes, M.1
Buseniusl, A.2
Hritcu, C.3
-
4
-
-
55949087657
-
A computationally sound mechanized prover for security protocols
-
B. Blanchet, "A computationally sound mechanized prover for security protocols," IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 4, pp. 193-207, 2008.
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.4
, pp. 193-207
-
-
Blanchet, B.1
-
5
-
-
84869450610
-
From computationally-proved protocol specifications to implementations
-
Prague, Czech, Aug
-
D. Cade and B. Blanchet, "From computationally-proved protocol specifications to implementations," in Proceeding of The Seventh International Conference on Availability, Reliability and Security, pp. 204-208, Prague, Czech, Aug. 2012.
-
(2012)
Proceeding of The Seventh International Conference on Availability, Reliability and Security
, pp. 204-208
-
-
Cade, D.1
Blanchet, B.2
-
6
-
-
84886918886
-
From computationally-proved protocol specifications to implementations and application to ssh
-
D. Cade and B. Blanchet, "From computationally-proved protocol specifications to implementations and application to ssh," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 4, no. 1, pp. 4-31, 2013.
-
(2013)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
, vol.4
, Issue.1
, pp. 4-31
-
-
Cade, D.1
Blanchet, B.2
-
7
-
-
84936762208
-
Proved generation of implementations from computationally secure protocol specifications1
-
D. Cade and B. Blanchet, "Proved generation of implementations from computationally secure protocol specifications1," Journal of Computer Security, vol. 23, no. 3, pp. 331-402, 2015.
-
(2015)
Journal of Computer Security
, vol.23
, Issue.3
, pp. 331-402
-
-
Cade, D.1
Blanchet, B.2
-
8
-
-
84872001641
-
Visual model-driven design, verification and implementation of security protocols
-
Omaha, Nebraska, USA., Oct
-
P. B. Copet, R. S. A. Pironti, D. Pozza, and P. Vivoli, "Visual model-driven design, verification and implementation of security protocols," in The 1ath IEEE International Symposium on High-Assurance Systems Engineering, pp. 62-65, Omaha, Nebraska, USA., Oct. 2012.
-
(2012)
The 1ath IEEE International Symposium on High-Assurance Systems Engineering
, pp. 62-65
-
-
Copet, P.B.1
Pironti, R.S.A.2
Pozza, D.3
Vivoli, P.4
-
9
-
-
84958527013
-
Automated formal verification of application-specific security properties
-
LNCS 8364, Springer
-
P. B. Copet and R. Sisto, "Automated formal verification of application-specific security properties," in The 6th International Symposium on Engineering Secure Software and Systems, LNCS 8364, pp. 45-59, Springer, 2014.
-
(2014)
The 6th International Symposium on Engineering Secure Software and Systems
, pp. 45-59
-
-
Copet, P.B.1
Sisto, R.2
-
10
-
-
84953318282
-
Improved methods and principles for designing and analyzing security protocols
-
A. Kartit, H. K. Idrissi, and M. Belkhouraf, "Improved methods and principles for designing and analyzing security protocols," International Journal of Network Security, vol. 18, no. 3, pp. 523-528, 2016.
-
(2016)
International Journal of Network Security
, vol.18
, Issue.3
, pp. 523-528
-
-
Kartit, A.1
Idrissi, H.K.2
Belkhouraf, M.3
-
11
-
-
84868246509
-
Multi-language oriented automatic realization method for cryptographic protocols
-
X. H. Li, D. Li, S. T. Li, and J. F. Ma, "Multi-language oriented automatic realization method for cryptographic protocols," Journal on Communications, vol. 33, no. 9, pp. 152-159, 2012.
-
(2012)
Journal on Communications
, vol.33
, Issue.9
, pp. 152-159
-
-
Li, X.H.1
Li, D.2
Li, S.T.3
Ma, J.F.4
-
12
-
-
84908245464
-
Mechanized verification of cryptographic security of cryptographic security protocol implementation in java through model extraction in the computational model
-
B. Meng, Z. M. Li, and W. Chen, "Mechanized verification of cryptographic security of cryptographic security protocol implementation in java through model extraction in the computational model," Journal of Software Engineering, vol. 9, no. 1, pp. 1-32, 2015.
-
(2015)
Journal of Software Engineering
, vol.9
, Issue.1
, pp. 1-32
-
-
Meng, B.1
Li, Z.M.2
Chen, W.3
-
13
-
-
84921695016
-
Efficient java code generation of security protocols specified in anb/anbx
-
Wroclaw, Poland, Sep
-
P. Modesti, "Efficient java code generation of security protocols specified in anb/anbx," in the 10th International Workshop on Security and Trust Management, pp. 204-208, Wroclaw, Poland, Sep. 2014.
-
(2014)
the 10th International Workshop on Security and Trust Management
, pp. 204-208
-
-
Modesti, P.1
-
14
-
-
84857355689
-
Formally based semi-automatic implementation of an open security protocol
-
A. Pironti, D. Pozza, and R. Sisto, "Formally based semi-automatic implementation of an open security protocol," Journal of Systems and Software, vol. 85, no. 4, pp. 835-849, 2012.
-
(2012)
Journal of Systems and Software
, vol.85
, Issue.4
, pp. 835-849
-
-
Pironti, A.1
Pozza, D.2
Sisto, R.3
-
15
-
-
84891887538
-
Safe abstractions of data encodings in formal security protocol models
-
A. Pironti and R. Sisto, "Safe abstractions of data encodings in formal security protocol models," Formal Aspects of Computing, vol. 26, no. 1, pp. 125-167, 2014.
-
(2014)
Formal Aspects of Computing
, vol.26
, Issue.1
, pp. 125-167
-
-
Pironti, A.1
Sisto, R.2
-
16
-
-
77949567843
-
Provably correct java implementations of spi calculus security protocols specifications
-
A. Pirontia and R. Sisto, "Provably correct java implementations of spi calculus security protocols specifications," Computers & Security, vol. 29, no. 3, pp. 302-314, 2010.
-
(2010)
Computers & Security
, vol.29
, Issue.3
, pp. 302-314
-
-
Pirontia, A.1
Sisto, R.2
-
17
-
-
84947086841
-
A lightweight rfid security protocol based on elliptic curve cryptography
-
Q. Qian and Y. Long, J. R. Zhang, "A lightweight rfid security protocol based on elliptic curve cryptography," International Journal of Network Security, vol. 18, no. 2, pp. 354-361, 2016.
-
(2016)
International Journal of Network Security
, vol.18
, Issue.2
, pp. 354-361
-
-
Qian, Q.1
Long, Y.2
Zhang, J.R.3
-
18
-
-
85014070815
-
Protocol implementation generator
-
Espoo, Finland, Oct
-
J. Quaresma and C. Probst, "Protocol implementation generator," in The 15th Nordic Conference on Secure IT Systems, pp. 256-268, Espoo, Finland, Oct. 2010.
-
(2010)
The 15th Nordic Conference on Secure IT Systems
, pp. 256-268
-
-
Quaresma, J.1
Probst, C.2
|