Inductive Analysis of the Internet Protocol TLS (1997)

Cached

Download Links

by Lawrence C. Paulson
Venue:ACM Transactions on Information and System Security
Citations:110 - 16 self

Active Bibliography

29 Proving security protocols correct – Lawrence C. Paulson - 1999
1 Information Assurance for Security Protocols – Giampaolo Bella, Stefano Bistarelli
4 Planning attacks to security protocols: Case studies in logic programming – Luigia Carlucci Aiello, Fabio Massacci - 2001
3 SET Cardholder Registration: The Secrecy Proofs – Lawrence C. Paulson - 2001
22 Using Isabelle to Prove Properties of the Kerberos Authentication System – Giampaolo Bella, Lawrence C Paulson - 1997
32 Verifying security protocols as planning in logic programming – Fabio Massacci - 2001
22 Security Protocols over open networks and distributed systems: Formal methods for their Analysis, Design, and Verification – Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis - 1999
150 Proving Properties of Security Protocols by Induction – Lawrence C. Paulson - 1997
3 Making sense of specifications: the formalization of set (extended abstract – Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson - 2000
10 Verifying the SET purchase protocols – Giampaolo Bella, Fabio Massacci, Lawrence C Paulson - 2001
3 Breaking Security Protocols as an AI Planning Problem – Fabio Massacci - 1997
406 The inductive approach to verifying cryptographic protocols – Lawrence C. Paulson - 1998
5 Equational approach to formal analysis of tls – Kazuhiro Ogata, Kokichi Futatsugi - 2005
8 Embedding CSP in PVS. An Application to Authentication Protocols – Bruno Dutertre, Steve Schneider - 1997
188 A Hierarchy of Authentication Specifications – Gavin Lowe - 1997
1 Formal Verification Techniques For Computer Communication Security Protocols – Lu Ma, Jeffrey J. P. Tsai
1 Kerberos Version IV: Inductive Analysis of the Secrecy Goals – Giampaolo Bella Lawrence, Lawrence C Paulson - 1998
73 Kerberos version IV: Inductive analysis of the secrecy goals – Giampaolo Bella, Lawrence C Paulson - 1998
15 Mechanising BAN Kerberos by the Inductive Method – Giampaolo Bella, Lawrence C Paulson - 1998