-
2
-
-
0030679458
-
An interface specification language for automatically analyzing cryptographic protocols
-
S. Brackin. An interface specification language for automatically analyzing cryptographic protocols. In Symposium on Network and Distributed System Security, 1997.
-
(1997)
Symposium on Network and Distributed System Security
-
-
Brackin, S.1
-
3
-
-
85031624672
-
A state-based HOL theory of protocol failure
-
Inc., Ithaca, NY, October
-
S. Brackin. A state-based HOL theory of protocol failure. Technical Report 98007, Arca Systems, Inc., Ithaca, NY, October 1997.
-
(1997)
Technical Report 98007, Arca Systems
-
-
Brackin, S.1
-
8
-
-
0032623470
-
Security Protocols over open networks and distributed systems: Formal methods for their analysis
-
to appear. Currently
-
S. Gritzalis, D. Spinellis, and P. Georgiadis. Security Protocols over open networks and distributed systems: Formal methods for their analysis, design and verification, Computer Communications, 1999, to appear. Currently available at http://kerkis.math.aegean.gr/~dspin/pubs/jrnl/1997-CompComm-Formal/html/formal.htm.
-
(1999)
Design and Verification, Computer Communications
-
-
Gritzalis, S.1
Spinellis, D.2
Georgiadis, P.3
-
9
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Richard Kemmerer, Catherine Meadows, and Jonathan Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 3(2), 1994.
-
(1994)
Journal of Cryptology
, vol.3
, Issue.2
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
11
-
-
0030084918
-
The nrl protocol analyzer: An overview
-
February
-
Catherine Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Program-ming, 26(2):113-131, February 1996.
-
(1996)
Journal of Logic Program-ming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
17
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
December
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12), December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
-
-
Needham, R.1
Schroeder, M.2
-
18
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
B. Cliford Newman and Theodore Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9):33-38, September 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 33-38
-
-
Cliford Newman, B.1
Ts'O, T.2
-
19
-
-
0023247970
-
Eficient and timely authentication
-
David Otway and Owen Rees. Eficient and timely authentication. Operating Systems Re-view, 21(1):8-10, 1987.
-
(1987)
Operating Systems Re-view
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
20
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6(1):85-128, 1998.
-
(1998)
J. Computer Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.1
-
21
-
-
85037030730
-
-
The SSL protocol., March
-
The SSL protocol. http://home.netscape.com /newsref/std/SSL.html, March 1996.
-
(1996)
-
-
|