AnBx - Security Protocols Design and Verification
暂无分享,去创建一个
[1] Martín Abadi,et al. Prudent engineering practice for cryptographic protocols , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[2] Kazuhiro Ogata,et al. Formal Analysis of the iKP Electronic Payment Protocols , 2002, ISSS.
[3] Sebastian Mödersheim,et al. OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.
[4] Ronald Cramer,et al. Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack , 2003, SIAM J. Comput..
[5] Fabio Massacci,et al. An overview of the verification of SET , 2005, International Journal of Information Security.
[6] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[7] Bruce Schneier,et al. Protocol Interactions and the Chosen Protocol Attack , 1997, Security Protocols Workshop.
[8] Cédric Fournet,et al. Cryptographically Sound Implementations for Communicating Processes , 2006, ICALP.
[9] Michele Bugliesi,et al. Secure implementations of typed channel abstractions , 2007, POPL '07.
[10] Mihir Bellare,et al. iKP - A Family of Secure Electronic Payment Protocols , 1995, USENIX Workshop on Electronic Commerce.
[11] Cédric Fournet,et al. A secure compiler for session abstractions , 2008, J. Comput. Secur..
[12] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[13] Jan Vitek,et al. Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .
[14] Hugo Krawczyk,et al. Design, implementation, and deployment of the iKP secure electronic payment system , 2000, IEEE Journal on Selected Areas in Communications.
[15] Michael Backes,et al. Type-checking zero-knowledge , 2008, CCS.
[16] D. O'Mahony,et al. Electronic payment systems for e-commerce , 2001 .
[17] Joshua D. Guttman,et al. Security protocol design via authentication tests , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[18] Martín Abadi,et al. Authentication primitives and their compilation , 2000, POPL '00.
[19] Ueli Maurer,et al. A Calculus for Secure Channel Establishment in Open Networks , 1994, ESORICS.
[20] Martín Abadi,et al. Secure Implementation of Channel Abstractions , 2002, Inf. Comput..
[21] Martín Abadi,et al. Secure network objects , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[22] Joshua D. Guttman,et al. Programming Cryptographic Protocols , 2005, TGC.
[23] Sebastian Mödersheim,et al. The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols , 2009, FOSAD.
[24] Sebastian Mödersheim,et al. Algebraic Properties in Alice and Bob Notation , 2009, 2009 International Conference on Availability, Reliability and Security.
[25] Cédric Fournet,et al. Cryptographic Protocol Synthesis and Verification for Multiparty Sessions , 2009, 2009 22nd IEEE Computer Security Foundations Symposium.
[26] Cédric Fournet,et al. Secure Implementations for Typed Session Abstractions , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).
[27] Michele Bugliesi,et al. Language Based Secure Communication , 2008, 2008 21st IEEE Computer Security Foundations Symposium.