-
2
-
-
85051835099
-
Fundamentals of computer security technology
-
E. Amoroso. Fundamentals of Computer Security Technology. AT&T Bel] Laboratories, 1994.
-
(1994)
AT&T Bel] Laboratories
-
-
Amoroso, E.1
-
4
-
-
0024905645
-
An approach to systems verification
-
See also three other articles in the same issue by Young, Moore, and Hunt
-
W. R. Bevier, W. A. Hunt, Jr., J S. Moore, and W. D. Young. An approach to systems verification. Journal of Automated Reasoning, 5: 411-428, 1989. See also three other articles in the same issue by Young, Moore, and Hunt.
-
(1989)
Journal of Automated Reasoning
, vol.5
, pp. 411-428
-
-
Bevier, W.R.1
Hunt, W.A.2
Moore, J.S.3
Young, W.D.4
-
9
-
-
0025386404
-
A logic of authentication
-
February
-
M. Burrows, M, Abadi, and R. Needham. A Logic of Authentication. ACM Transactions on Computer Systems, 8(1): 18-36, February 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
14
-
-
0020720357
-
On the security of public key protocols
-
March
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2): 198-208, March 1989.
-
(1989)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
15
-
-
84949641590
-
Using a PVS embedding of CSP to verify authentication protocols
-
August . LNCS
-
B. Dutertre and S. Schneider. Using a PVS embedding of CSP to verify authentication protocols. In Theorem Proving in Higher Order Logics, pages 121-136, August 1997. LNCS 1275.
-
(1997)
Theorem Proving in Higher Order Logics
, vol.1275
, pp. 121-136
-
-
Dutertre, B.1
Schneider, S.2
-
17
-
-
0029755480
-
Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
-
San Francisco, CA, March
-
B. Guha and B. Mukherjee. Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions. In Proc. IEEE Infocom'96, pages 603-610, San Francisco, CA, March 1996.
-
(1996)
Proc. IEEE Infocom'96
, pp. 603-610
-
-
Guha, B.1
Mukherjee, B.2
-
18
-
-
0001924088
-
A model for secure protocols and their compositions
-
January
-
N, Heintze and J. Tygar, A model for secure protocols and their compositions. IEEE Transactions on Software Engineering, 22(l): 16-30, January 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 16-30
-
-
Heintze, N.1
Tygar, J.2
-
19
-
-
0001747063
-
Model checking electronic commerce protocols
-
November
-
N. Heintze, J. Tygar, J. Wing, and H. Wong. Model checking electronic commerce protocols. In Proceedings of the Second USENIX Workshop in Electronic Commerce, pages 147-164, November 1996.
-
(1996)
Proceedings of the Second USENIX Workshop in Electronic Commerce
, pp. 147-164
-
-
Heintze, N.1
Tygar, J.2
Wing, J.3
Wong, H.4
-
22
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
R. Kemmerer, C, Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2): 79-l3Q, 1994.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79l3Q
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
29
-
-
0022012611
-
A comment on the basic security theorem of bell and lapadula
-
J. McLean. A Comment on the Basic Security Theorem of Bell and LaPadula. Information Processing Letters, 20, 1985
-
(1985)
Information Processing Letters
, pp. 20
-
-
McLean, J.1
-
30
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
C. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1: 5-53, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, pp. 5-53
-
-
Meadows, C.1
-
31
-
-
85051797133
-
Analysis of the internet key exchange protocol using the nrl protocol analyzer
-
C-Meadows. Analysis of the Internet Key Exchange Protocol Using the NRL Protocol Analyzer, submitted to 1999 Security and Privacy, 1998.
-
(1998)
1999 Security and Privacy
-
-
Meadows, C.1
-
32
-
-
0023295108
-
The interrogator; Protocol security analysis
-
February
-
J. K. Milieu, S. C. Clark, and S. B. Freedman. The Interrogator; Protocol Security Analysis. IEEE Trans, on Soft. Eng., 13(2), February 1987.
-
(1987)
IEEE Trans, on Soft. Eng.
, vol.13
, Issue.2
-
-
Milieu, J.K.1
Clark, S.C.2
Freedman, S.B.3
-
33
-
-
0030705405
-
Automated analysis of cryptographic protocols using murphi
-
J. Mitchell, M, Mitchell, and U. Stern, Automated Analysis of Cryptographic Protocols Using Murphi. In Proceedings of the IEEE Conference on Sectiirty and Privacy, pages 141-151, 1997.
-
(1997)
Proceedings of the IEEE Conference on Sectiirty and Privacy
, pp. 141-151
-
-
Mitchell, J.1
Mitchell, M.2
Stern, U.3
|