Active Bibliography

6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
29 The Logic of Authentication Protocols – Paul Syverson, Iliano Cervesato - 2001
20 Security Protocols over open networks and distributed systems: Formal methods for their Analysis, Design, and Verification – Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis - 1999
26 Formal Methods for the Analysis of Authentication Protocols – Aviel D. Rubin, Peter Honeyman - 1993
82 Fail-Stop Protocols: An Approach to Designing Secure Protocols – Li Gong - 1994
4 Using Weakest Preconditions To Evaluate Cryptographic Protocols – Alec Yasinsac, William A. Wulf - 1996
3 A FRAMEWORK FOR A CRYPTOGRAPHIC PROTOCOL EVALUATION WORKBENCH – Alec Yasinsac , William A. Wulf
3 The Scope of a Logic of Authentication – Michael Burrows, Martin Abadi, Roger Needham - 1990
Static Analyses of Cryptographic Protocols – Jay McCarthy - 2009
7 Formal Methods in the Design of Cryptographic Protocols (state of the Art) – Levente Buttyan - 1999
40 Security Protocols and their Properties – Martín Abadi - 2000
Introduction to Foundations of Security Protocols – R. Ramanujam, S. P. Suresh
unknown title – Foreword Whitfield Diffie
83 Applying Formal Methods to the Analysis of a Key Management Protocol – Catherine Meadows - 1992
91 Some New Attacks upon Security Protocols – Gavin Lowe - 1996
17 Computationally Sound Mechanized Proofs of Correspondence Assertions – Bruno Blanchet - 2007
Review of the state of the art (in Security and Dependability Monitoring and Recovery) – G. Spanoudakis, C. Kloukinas, T. Tsigritis, K. Androutsopoulos, C. Ballas, Domenico Presenza - 2006
25 Security Protocols and Specifications – Martín Abadi - 1999
24 A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol – Michael Backes - 2004