Inductive Analysis of the Internet Protocol TLS (1997)

Cached

Download Links

by Lawrence C. Paulson
Venue:ACM Transactions on Information and System Security
Citations:111 - 16 self

Documents Related by Co-Citation

407 The inductive approach to verifying cryptographic protocols – Lawrence C. Paulson - 1998
1143 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
615 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
73 Kerberos version IV: Inductive analysis of the secrecy goals – Giampaolo Bella, Lawrence C Paulson - 1998
237 The NRL Protocol Analyzer: An Overview – Catherine Meadows - 1996
1053 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
263 Automated Analysis of Cryptographic Protocols Using Murphi – John C. Mitchell, Mark Mitchell, Ulrich Stern - 1997
198 A compiler for the analysis of security protocols – Casper - 1997
357 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
82 Fail-Stop Protocols: An Approach to Designing Secure Protocols – Li Gong - 1994
866 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
421 The Foundation of a Generic Theorem Prover – Lawrence C. Paulson - 1989
9 Message reception in the inductive approach – G Bella - 1999
73 Verifying authentication protocols with CSP – Steve Schneider
70 The Modeling and Analysis of Security Protocols: the CSP Approach – P Ryan, S Schneider, M Goldsmith, G Lowe, B Roscoe - 2000
77 Finite-State Analysis of SSL 3.0 – John C. Mitchell, Vitaly Shmatikov, Ulrich Stern, John C. Mitchell, Vitaly Shmatikov, Ulrich Stern - 1998
136 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millen - 1994
55 What do we mean by entity authentication – D Gollmann - 1996
55 Open Issues in Formal Methods for Cryptographic Protocol Analysis – Catherine Meadows - 2000