Documents Related by Co-Citation

613 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
1044 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
783 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
84 On the Reachability Problem in Cryptographic Protocols – Roberto M. Amadio, Roberto M. Amadio, Denis Lugiez, Denis Lugiez, Thème Réseaux Et Systèmes, Unité Inria, Sophia Antipolis - 2000
198 A compiler for the analysis of security protocols – Casper - 1998
236 The NRL Protocol Analyzer: An Overview – Catherine Meadows - 1996
45 CAPSL: Common authentication protocol specification language – J K Millen - 1996
135 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millan - 1994
263 Automated Analysis of Cryptographic Protocols Using Murphi – John C. Mitchell, Mark Mitchell, Ulrich Stern - 1997
114 A Probabilistic Poly-Time Framework for Protocol Analysis – P. Lincoln, J. Mitchell, M. Mitchell, A. Scedrov - 1998
142 A meta-notation for protocol analysis – I. Cervesato, N. A. Durgin, P. D. Lincoln, J. C. Mitchell, A. Scedrov - 1999
107 Authenticity by typing for security protocols – Andrew D. Gordon, Alan Jeffrey
72 Athena: a new efficient automatic checker for security protocol analysis – Dawn Xiaodong Song - 1999
354 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
69 A Model for Secure Protocols and Their Compositions (Extended Abstract) – Nevin Heintze, J. D. Tygar - 1996
83 Applying Formal Methods to the Analysis of a Key Management Protocol – Catherine Meadows - 1992
45 Protocol Specification and Analysis in Maude – G. Denker, J. Meseguer, C. Talcott - 1998