Inductive Analysis of the Internet Protocol TLS (1997)

Cached

Download Links

by Lawrence C. Paulson
Venue:ACM Transactions on Information and System Security
Citations:110 - 16 self

Documents Related by Co-Citation

406 The inductive approach to verifying cryptographic protocols – Lawrence C. Paulson - 1998
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
613 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
73 Kerberos version IV: Inductive analysis of the secrecy goals – Giampaolo Bella, Lawrence C Paulson - 1998
236 The NRL Protocol Analyzer: An Overview – Catherine Meadows - 1996
1044 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
263 Automated Analysis of Cryptographic Protocols Using Murphi – John C. Mitchell, Mark Mitchell, Ulrich Stern - 1997
82 Fail-Stop Protocols: An Approach to Designing Secure Protocols – Li Gong - 1994
862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
422 The Foundation of a Generic Theorem Prover – Lawrence C. Paulson - 1989
198 A compiler for the analysis of security protocols – Casper - 1998
9 Message reception in the inductive approach – G Bella - 1999
70 Modeling and analysis of security protocols: the CSP Approach – P Y A Ryan, S A, Schneider - 2001
135 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millan - 1994
77 Finite-State Analysis of SSL 3.0 – John C. Mitchell, Vitaly Shmatikov, Ulrich Stern, John C. Mitchell, Vitaly Shmatikov, Ulrich Stern - 1998
55 What do we mean by entity authentication – D Gollmann - 1996
54 Open Issues in Formal Methods for Cryptographic Protocol Analysis – Catherine Meadows - 2000
354 Prudent Engineering Practice for Cryptographic Protocols – Martin Abadi, Roger Needhamt - 1994
95 Modelling and verifying key-exchange protocols using CSP and FDR – A. W. Roscoe - 1995