A Bisimulation Method for Cryptographic Protocols (1998)

by Martín Abadi , Andrew D. Gordon
Citations:79 - 5 self

Documents Related by Co-Citation

783 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
60 Proof Techniques for Cryptographic Processes – Michele Boreale, Rocco De Nicola, Rosario Pugliese - 1999
276 Mobile Values, New Names, and Secure Communication – Martín Abadi, Cédric Fournet - 2001
1044 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
613 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
1000 Bigraphs and Mobile Processes – Ole Høgh Jensen, Robin Milner - 2003
114 A Probabilistic Poly-Time Framework for Protocol Analysis – P. Lincoln, J. Mitchell, M. Mitchell, A. Scedrov - 1998
3219 Communication and Concurrency – R Milner - 1990
84 On the Reachability Problem in Cryptographic Protocols – Roberto M. Amadio, Roberto M. Amadio, Denis Lugiez, Denis Lugiez, Thème Réseaux Et Systèmes, Unité Inria, Sophia Antipolis - 2000
409 Testing Equivalences for Processes – R. De Nicola, M. C. B. Hennessy - 1984
30 On Bisimulations for the Spi Calculus – Johannes Borgström, Uwe Nestmann - 2002
245 Secrecy by Typing in Security Protocols – Martín Abadi - 1998
406 The inductive approach to verifying cryptographic protocols – Lawrence C. Paulson - 1998
333 Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption) – Martín Abadi, Phillip Rogaway - 2000
1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
73 Verifying authentication protocols in CSP – S Schneider - 1998
592 A Communicating and Mobile Systems: the π-Calculus – R Milner - 1999
80 The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties – Riccardo Focardi, Roberto Gorrieri - 1996