Proving Properties of Security Protocols by Induction (1997)

by Lawrence C. Paulson
Venue:In 10th IEEE Computer Security Foundations Workshop
Citations:150 - 7 self

Documents Related by Co-Citation

1132 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
613 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
1044 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
862 Using encryption for authentication in large networks of computers – R Needham, M Schroeder - 1978
263 Automated Analysis of Cryptographic Protocols Using Murphi – John C. Mitchell, Mark Mitchell, Ulrich Stern - 1997
783 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
236 The NRL Protocol Analyzer: An Overview – Catherine Meadows - 1996
149 A Semantic Model for Authentication Protocols – Thomas Y. C. Woo, Simon S. Lam - 1993
198 A compiler for the analysis of security protocols – Casper - 1998
135 Three systems for cryptographic protocol analysis – R Kemmerer, C Meadows, J Millan - 1994
61 Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols – E. M. Clarke, S. Jha, W. Marrero - 1998
69 A Model for Secure Protocols and Their Compositions (Extended Abstract) – Nevin Heintze, J. D. Tygar - 1996
61 Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches – Catherine A. Meadows - 1996
41 A Model of Computation for the NRL Protocol Analyzer – Catherine Meadows - 1994
113 Security properties and CSP – Steve Schneider, Royal Holloway - 1995
226 A survey of authentication protocol literature – John Clark, Jeremy Jacob - 1997
31 The Interrogator model – J K Millen - 1995
188 A Hierarchy of Authentication Specifications – Gavin Lowe - 1997
44 Intensional Specifications of Security Protocols – A. W. Roscoe - 1998