Cryptographically sound analysis of security protocols
暂无分享,去创建一个
[1] Birgit Pfitzmann,et al. Composition and integrity preservation of secure reactive systems , 2000, CCS.
[2] Heiko Mantel,et al. A generic approach to the security of multi-threaded programs , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[3] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[4] Peeter Laud. Semantics and Program Analysis of Computationally Secure Information Flow , 2001, ESOP.
[5] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[6] Lawrence C. Paulson,et al. The Inductive Approach to Verifying Cryptographic Protocols , 2021, J. Comput. Secur..
[7] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2003, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[8] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[9] E. Stewart Lee,et al. A general theory of security properties , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[10] Birgit Pfitzmann,et al. A model for asynchronous reactive systems and its application to secure message transmission , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[11] J DenningPeter,et al. Certification of programs for secure information flow , 1977 .
[12] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.
[13] Nancy A. Lynch,et al. I/O automaton models and proofs for shared-key communication systems , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[14] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[15] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[16] David Sands,et al. Probabilistic noninterference for multi-threaded programs , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[17] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[18] John C. Mitchell,et al. A probabilistic poly-time framework for protocol analysis , 1998, CCS '98.
[19] Jonathan K. Millen,et al. The Interrogator A Tool for Cryptographic Protocol Security , 1984, 1984 IEEE Symposium on Security and Privacy.
[20] James W. Gray,et al. Probabilistic interference , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[21] Martín Abadi,et al. Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)* , 2001, Journal of Cryptology.
[22] A. W. Roscoe. Modelling and verifying key-exchange protocols using CSP and FDR , 1995, Proceedings The Eighth IEEE Computer Security Foundations Workshop.
[23] Gavin Lowe,et al. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.
[24] Dennis M. Volpano. Secure introduction of one-way functions , 2000, Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
[25] Daryl McCullough,et al. Specifications for Multi-Level Security and a Hook-Up , 1987, 1987 IEEE Symposium on Security and Privacy.
[26] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[27] Jonathan K. Millen,et al. Covert Channel Capacity , 1987, 1987 IEEE Symposium on Security and Privacy.
[28] Geoffrey Smith,et al. Probabilistic noninterference in a concurrent language , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[29] Geoffrey Smith,et al. Eliminating covert flows with minimum typings , 1997, Proceedings 10th Computer Security Foundations Workshop.
[30] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[31] Roberto Gorrieri,et al. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties , 1997, IEEE Trans. Software Eng..
[32] Victor Shoup,et al. Secure and Efficient Asynchronous Broadcast Protocols , 2001, CRYPTO.
[33] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[34] Donald Beaver,et al. Cryptographic Protocols Provably Secure Against Dynamic Adversaries , 1992, EUROCRYPT.
[35] Steve A. Schneider. Security properties and CSP , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[36] Bowen Alpern,et al. Defining Liveness , 1984, Inf. Process. Lett..
[37] Catherine A. Meadows,et al. Using narrowing in the analysis of key management protocols , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[38] Andrew C. Myers,et al. Robust declassification , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[39] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[40] José Meseguer,et al. Unwinding and Inference Control , 1984, 1984 IEEE Symposium on Security and Privacy.
[41] Heiko Mantel,et al. Unwinding Possibilistic Security Properties , 2000, ESORICS.
[42] Martín Abadi,et al. A calculus for cryptographic protocols: the spi calculus , 1997, CCS '97.
[43] J. Todd Wittbold,et al. Information flow in nondeterministic systems , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[44] Birgit Pfitzmann,et al. Provably Secure Certified Mail , 2000 .
[45] David Sands,et al. A Per Model of Secure Information Flow in Sequential Programs , 1999, High. Order Symb. Comput..
[46] Claudia Eckert. On security models , 1996, SEC.
[47] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[48] Ira S. Moskowitz,et al. A network version of the Pump , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[49] Geoffrey Smith,et al. Secure information flow in a multi-threaded imperative language , 1998, POPL '98.
[50] Martín Abadi,et al. Secrecy types for asymmetric communication , 2001, Theor. Comput. Sci..
[51] A. W. Roscoe,et al. What is intransitive noninterference? , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[52] John C. Mitchell,et al. Probabilistic Polynomial-Time Equivalence and Security Analysis , 1999, World Congress on Formal Methods.
[53] John McLean,et al. Security models and information flow , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[54] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[55] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[56] Owre Sam,et al. Abstract Datatypes in PVS , 1997 .
[57] Natarajan Shankar,et al. PVS: A Prototype Verification System , 1992, CADE.
[58] Joshua D. Guttman,et al. Strand spaces: why is a security protocol correct? , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[59] James W. Gray,et al. Toward a mathematical foundation for information flow security , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[60] Geoffrey Smith,et al. A new type system for secure information flow , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[61] David L. Dill,et al. Automatic verification of Pipelined Microprocessor Control , 1994, CAV.
[62] Matthias Schunter,et al. Optimistic fair exchange , 2000 .
[63] J. Thomas Haigh,et al. Extending The Non-Interference Version Of MLS For Sat , 1987, 1986 IEEE Symposium on Security and Privacy.
[64] Birgit Pfitzmann,et al. Secure Reactive Systems , 2000 .
[65] M. F.,et al. Bibliography , 1985, Experimental Gerontology.