References
- Technical Report SRC RR149 A calculus for crytopraphic protocols : The Spicalculus M.Abadi;A.Gordon
- In Proc. of the Tenth Annual ACM Symposium on Principles of Distributed Computing A semantics for a logic of authentication M. Abadi;M. Tuttle
- In Advance in Cryptology-CRYPTO 93 Entity authentication and key distribution M. Bellare;P.Rogaway
- In ACM Symposium on Theory of computing A modular approach to the design and analysis of authentication and key exchange protocols M.Bellare;R.Canetti;H.Krawczyk
- In Proc. of the IEEE Computer Security Foundation Workshop A logic of communication in a hostile environment P.Bieber
- In Sixth IMA International Comference on Cryptography and Coding Key agreement protocols and their security analysis S.Blake-Wilson;D.Johnson;A.Menesez
- In Advances in Cryptology - Eurocrypt 93 On a limitation of BAN logic C.Boyd;W.Mao
- In Proc. of the IEEE Computer Security Foundation Workshop A HOL extension of GNY for automatically analyzing cryptographic protocols S.Brackin
- In Proc. of the ISOC Network and Distributed System Security An interface specification language for automatically analyzing cryptographic protocol S.Brackin
- In Proc. of the IEEE Conputer Security Foundation Workshop Evaluating and improving protocol analysis by automatic proof S.Brackin
- In Proc. of IEEE ASSET 99 A CAPSL interface for the NRL Protocol Analyzer S.Brackin;C.Meadow;J.Millen
- Technicla Report SRC RR 39 A logic of authentication M.Burrows;M.Abadi;R.Needham
- EPFL SSC Technical Report No. SSC/1999/038 Formal method in the disign fo cryptographic protocols L.Buttyan
- A survey of authentication porotocol literature: version 1.0 J.Clark;J.Jacob
- In Proc. of the IEEE Computer Scurity Foundation Workshop C3PO: a tool for automatic sound cryptographic protocol analysis A.Dekker
- IEEE Transactions on Information theory v.22 New directions on Information theory W.Diffie;M.Hellman https://doi.org/10.1109/TIT.1976.1055638
- IEEE Transactions on Information Theory v.29 On the security oj public key protocols D.Dolev;A.Yao https://doi.org/10.1109/TIT.1983.1056650
- In Proc. of the IEEE Computer Security Foundation Workshop Honest ideals on strand spaces F.Fabrega;J.Herzog;J.Guttman
- In Proc. of the IEEE Symposium on Research in Security and Provacy Strand spaces : Why is a security protocol correct? F.Fabrega;J.Herzog;J.Guttman
- In Proc. of the IEEE Symposium on Research in Sucurity and Privacy Reasoning about belief in cryptographic protocols L.Gong;R.Needham;R.Yahalom
- Computer Communications v.22 no.8 Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification S.Gritzalis;D.Spinellis;P.Georgiadis
- IEEE Journal on Selected Areas in Communications v.7 no.4 Analyzing encryption protocols using formal verification technique R.Kemmerer https://doi.org/10.1109/49.17707
- Australian Computer Science Sommunications v.17 no.1 On the automation of GNY logic A.Mathuria;R.Safavi-Naini;P.Nicholas
- In Proc. of the IEEE Symposium on Research in Security and Privacy A system for the specification and analysis of key management protocols C.Meadows
- Journal of Computer Security v.1 no.1 Applying formal methods to the analysis of a key management protocol C.Meadows https://doi.org/10.3233/JCS-1992-1102
- In Advances in Cryptography - Asiacrypt 94 Formal verification of cryptography protocols : A survey C.Meadows
- In Proc. of the IEEE symposium on Security and Privacy Analysis of the Internet Key Exchange protocol using NRL Protocol Analyzer C.Meadows
- IEEE Transactions on Software Engiveering v.13 no.2 The Interrogator : Protocol security analysis J.Millen;S.Clark;S.Freedman https://doi.org/10.1109/TSE.1987.233151
- In Proc. of the IEEE Symposium on Security and Privacy Automated analysis of cryptographic protocols using Mur J.Mitchell;M.Mitchell;U.Stern
- Operating Systems Review v.24 no.2 A critique of the Burrows Abadi and Needham logic D.Nessett https://doi.org/10.1145/382258.382789
- In Proc. of the IEEE Computer Security foundation Workshop A logic of composition for information flow predicates R.Peri;W.Wulf;D.Kienzle
- Personal Communicaitons C.V.Ramamoorthy
- In Proc. of the IEEE Computer Security Foundation Workshop Modelling and verifying key-exchange protocols using CSP & FDR A.Roscoe
- Technical Report CITI TR 93-7 Formal methods for the analysis of authentication protocols A.Rubin;P.Honeyman
- IBM Zurich Research Lab. On Formal Models for Sucure Key Exchange V.Shoup
- In Journal of Computer Security v.9 no.1 Athena:a novel approach to efficient automatic security protocol analysis D.Song;S.Berezin;A.Perrig https://doi.org/10.3233/JCS-2001-91-203
- In Proc. of the IEEE Symposium on Research in Security and Privacy Formal semantics for logics of cryptographic protocols P.Syverson
- In Proc. of the IEEE Symposium on Research in Security and Privacy On unifying some cryptographic protocol logics P.syverson;P.van Oorschot
- In Proc. of the ACM Conference on Computer Communications Security Extending cryptographic ligics of belief to key agreement protocols P.van Oorschot
- Computers and Security v.8 no.8 Verification of network security protocols V.Varadgarajan https://doi.org/10.1016/0167-4048(89)90008-4
- Computer Standards and Interfaces Use of a formal description technique in the specification of authentication protocols V.Varadgarajan