Prudent Engineering Practice for Cryptographic Protocols (1994)

by Martin Abadi , Roger Needhamt
Venue:Proc. IEEE Computer Society Symposium on Research in Security and Privacy
Citations:355 - 17 self

Active Bibliography

Systems Research Center – The Charter, Luca Cardelli, Florian Matthes, Robert W. Taylor - 1991
6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
26 Formal Methods for the Analysis of Authentication Protocols – Aviel D. Rubin, Peter Honeyman - 1993
7 Lower Bounds on Messages and Rounds for Network Authentication Protocols – Li Gong - 1993
23 Efficient Network Authentication Protocols: Lower Bounds and Optimal Implementations – Li Gong - 1995
2 Cryptographic Protocols over Open Distributed Systems: A Taxonomy of Flaws and related Protocol Analysis Tools – S. Gritzalis, D. Spinellis, Sena Sa - 1997
91 Some New Attacks upon Security Protocols – Gavin Lowe - 1996
Static Analyses of Cryptographic Protocols – Jay McCarthy - 2009
188 A Hierarchy of Authentication Specifications – Gavin Lowe - 1997
11 Trust Management for Widely Distributed Systems – Walt Teh-ming Yao - 2003
2 Attacking Authentication Protocols – John Clark - 1996
6 Variations on the Themes of Message Freshness and Replay - or the Difficulty in Devising Formal Methods to Analyze Cryptographic Protocols – Li Gong - 1993
Design and Performance Evaluation of the Nested Certification . . . – Albert Levi - 1999
40 Security Protocols and their Properties – Martín Abadi - 2000
41 Security for a High Performance Commodity Storage Subsystem – Howard Gobioff, M. Satyanarayanan - 1999
2 Efficient Automated Testing of Cryptographic Protocols – Sigrid Gürgens, René Peralta - 1998
29 The Logic of Authentication Protocols – Paul Syverson, Iliano Cervesato - 2001
35 Authentication Tests and the Structure of Bundles – Joshua D. Guttman, F. Javier, F. Javier Thayer Fàbrega - 2002
82 Fail-Stop Protocols: An Approach to Designing Secure Protocols – Li Gong - 1994