A Bisimulation Method for Cryptographic Protocols (1998)

by Martín Abadi , Andrew D. Gordon
Citations:79 - 5 self

Active Bibliography

4 The Spi Calculus – Martín Abadi, Andrew D. Gordon, Martín Abadi, Andrew D. Gordon - 1997
50 Reasoning about Cryptographic Protocols in the Spi Calculus – Martín Abadi, Andrew D. Gordon - 1997
40 Security Protocols and their Properties – Martín Abadi - 2000
2 An automatic approach for building secure systems – Xiaodong Dawn Song - 2002
Review of the state of the art (in Security and Dependability Monitoring and Recovery) – G. Spanoudakis, C. Kloukinas, T. Tsigritis, K. Androutsopoulos, C. Ballas, Domenico Presenza - 2006
20 Security Protocols over open networks and distributed systems: Formal methods for their Analysis, Design, and Verification – Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis - 1999
25 Security Protocols and Specifications – Martín Abadi - 1999
2 Model-Based Verification of a Security Protocol for Conditional Access to Services – Guy Leduc, Olivier Bonaventure, Luc Léonard, Eckhart Koerner, E. Koerner, Charles Pecheur - 1999
61 Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols – E. M. Clarke, S. Jha, W. Marrero - 1998
58 Model Checking for Security Protocols – Will Marrero , Edmund Clarke, Somesh Jha - 1997
14 Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol – Steve Schneider, Royal Holloway - 1996
2 Taming the Adversary – Martín Abadi - 2000
333 Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) – Martín Abadi, Phillip Rogaway - 2000
7 Formal Methods in the Design of Cryptographic Protocols (state of the Art) – Levente Buttyan - 1999
38 A Method for Automatic Cryptographic Protocol Verification – Jean Goubault-larrecq - 2000
26 Analysis of security protocols as open systems – Fabio Martinelli, Telematiche C. N. R - 2003
9 Model-based Design and Verification of Security Protocols using LOTOS – François Germeau, Guy Leduc - 1997
2 Verification of two versions of the Challenge Handshake Authentication Protocol (CHAP) – Guy Leduc - 2000
60 Proof Techniques for Cryptographic Processes – Michele Boreale, Rocco De Nicola, Rosario Pugliese - 1999