Towards Extensional Goals in Authentication Protocols (1997)

Cached

Download Links

by Colin Boyd
Venue:In Proceedings of the 1997 DIMACS Workshop on Design and Formal Verification of Security Protocols
Citations:11 - 0 self

Active Bibliography

6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
29 The Logic of Authentication Protocols – Paul Syverson, Iliano Cervesato - 2001
7 Formal Methods in the Design of Cryptographic Protocols (state of the Art) – Levente Buttyan - 1999
54 A derivation system and compositional logic for security protocols – Anupam Datta , Ante Derek , John C. Mitchell , Dusko Pavlovic - 2005
91 Some New Attacks upon Security Protocols – Gavin Lowe - 1996
2 An automatic approach for building secure systems – Xiaodong Dawn Song - 2002
Introduction to Foundations of Security Protocols – R. Ramanujam, S. P. Suresh
188 A Hierarchy of Authentication Specifications – Gavin Lowe - 1997
12 Protocol Composition Logic (PCL) – Anupam Datta, Ante Derek, John C. Mitchell, Arnab Roy - 2007
27 Security Goals: Packet Trajectories and Strand Spaces – Joshua D. Guttman
20 Security Protocols over open networks and distributed systems: Formal methods for their Analysis, Design, and Verification – Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis - 1999
4 Planning attacks to security protocols: Case studies in logic programming – Luigia Carlucci Aiello, Fabio Massacci - 2001
21 Analysis of Security Protocols – Nancy A. Durgin , John C. Mitchell - 1999
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
1 Security Models and Proofs for Key Establishment Protocols – Eddie M. Ng, C○eddie M. Ng
40 Security Protocols and their Properties – Martín Abadi - 2000
61 Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols – E. M. Clarke, S. Jha, W. Marrero - 1998
43 A Cost-Based Framework for Analysis of Denial of Service in Networks – Catherine Meadows - 2000
Software Quality and Infrastructure Protection for Diffuse Computing – J. Feigenbaum, J. Y. Halpern, P. D. Lincoln, J. C. Mitchell, A. Scedrov, J. M. Smith Ý, P. Syverson Þ