Proving Properties of Security Protocols by Induction (1997)

by Lawrence C. Paulson
Venue:In 10th IEEE Computer Security Foundations Workshop
Citations:150 - 7 self

Documents Related by Co-Citation

1143 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
615 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
1053 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
866 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
263 Automated Analysis of Cryptographic Protocols Using Murphi – John C. Mitchell, Mark Mitchell, Ulrich Stern - 1997
786 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
237 The NRL Protocol Analyzer: An Overview – Catherine Meadows - 1996
149 A Semantic Model for Authentication Protocols – Thomas Y. C. Woo, Simon S. Lam - 1993
198 A compiler for the analysis of security protocols – Casper - 1997
136 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millen - 1994
61 Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols – E. M. Clarke, S. Jha, W. Marrero - 1998
69 A Model for Secure Protocols and Their Compositions (Extended Abstract) – Nevin Heintze, J. D. Tygar - 1996
61 Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches – Catherine A. Meadows - 1996
41 A Model of Computation for the NRL Protocol Analyzer – Catherine Meadows - 1994
115 Security properties and CSP – Steve Schneider, Royal Holloway - 1995
230 A survey of authentication protocol literature – John Clark, Jeremy Jacob - 1997
189 A Hierarchy of Authentication Specifications – Gavin Lowe - 1997
31 The Interrogator model – J K Millen - 1995
44 Intensional Specifications of Security Protocols – A. W. Roscoe - 1998