Proving Properties of Security Protocols by Induction (1997)

by Lawrence C. Paulson
Venue:In 10th IEEE Computer Security Foundations Workshop
Citations:150 - 7 self

Active Bibliography

20 Security Protocols over open networks and distributed systems: Formal methods for their Analysis, Design, and Verification – Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis - 1999
188 A Hierarchy of Authentication Specifications – Gavin Lowe - 1997
21 Analysis of Security Protocols – Nancy A. Durgin , John C. Mitchell - 1999
An Environment for the Specification and Analysis of Cryptoprotocols – M. Debbabi, Y. Legare, M. Mejri
91 Some New Attacks upon Security Protocols – Gavin Lowe - 1996
Review of the state of the art (in Security and Dependability Monitoring and Recovery) – G. Spanoudakis, C. Kloukinas, T. Tsigritis, K. Androutsopoulos, C. Ballas, Domenico Presenza - 2006
55 Relations between secrets: Two formal analyses of the Yahalom protocol – Lawrence C. Paulson
29 The Logic of Authentication Protocols – Paul Syverson, Iliano Cervesato - 2001
29 Proving security protocols correct – Lawrence C. Paulson - 1999
3 Breaking Security Protocols as an AI Planning Problem – Fabio Massacci - 1997
11 Theory Generation for Security Protocols – Darrell Kindred, Jeannette Wing - 1999
6 Principles for Entity Authentication – Michele Bugliesi, Riccardo Focardi, Matteo Maffei, Fabio Tudone - 2003
7 Formal Methods in the Design of Cryptographic Protocols (state of the Art) – Levente Buttyan - 1999
6 Tool Support for Logics of Programs – Lawrence C. Paulson - 1996
1 What is Correctness of Security Protocols? – Giampaolo Bella
Static Analyses of Cryptographic Protocols – Jay McCarthy - 2009
29 Mechanized Proofs of Security Protocols: Needham-Schroeder with Public Keys – Lawrence C. Paulson - 1997
6 A Method for Examining Cryptographic Protocols – Brett C. Tjaden - 1997
1 Kerberos Version IV: Inductive Analysis of the Secrecy Goals – Giampaolo Bella Lawrence, Lawrence C Paulson - 1998