ACM SIGOPS Operating Systems Review
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Zero knowledge proofs of identity
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
NetCash: a design for practical electronic currency on the Internet
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
A lesson on authentication protocol design
ACM SIGOPS Operating Systems Review
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A security architecture for fault-tolerant systems
A security architecture for fault-tolerant systems
Cryptography and secure channels
Distributed systems (2nd Ed.)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
Timestamps in key distribution protocols
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Limitations of the Kerberos authentication system
ACM SIGCOMM Computer Communication Review
The MD4 Message Digest Algorithm
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Timed Models for Protocol Security
Timed Models for Protocol Security
Roles in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Trust Relationships in Secure Systems-A Distributed Authentication Perspective
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Explicit Communication Revisited: Two New Attacks on Authentication Protocols
IEEE Transactions on Software Engineering
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Inductive analysis of the Internet protocol TLS
ACM Transactions on Information and System Security (TISSEC)
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
An unknown key-share attack on the MQV key agreement protocol
ACM Transactions on Information and System Security (TISSEC)
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
TCP congestion control with a misbehaving receiver
ACM SIGCOMM Computer Communication Review
The verification of an industrial payment protocol: the SET purchase phase
Proceedings of the 9th ACM conference on Computer and communications security
Logical Cryptanalysis as a SAT Problem
Journal of Automated Reasoning
Guest Editorial: Introduction to the Special Section
IEEE Transactions on Software Engineering
An attack-finding algorithm for security protocols
Journal of Computer Science and Technology
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
Soft Constraints for Security Protocol Analysis: Confidentiality
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Non Interference for the Analysis of Cryptographic Protocols
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
An Intelligent Intruder Model for Security Protocol Analysis
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
AMBAR Protocol: Access Management Based on Authorization Reduction
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Secrecy Types for Asymmetric Communication
FoSSaCS '01 Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures
Mechanising a Protocol for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
From Secrecy to Authenticity in Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Abstracting Cryptographic Protocols by Prolog Rules
SAS '01 Proceedings of the 8th International Symposium on Static Analysis
Making Sense of Specifications: The Formalization of SET
Revised Papers from the 8th International Workshop on Security Protocols
Enhancing Survivability of Security Services Using Redundanc
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
SPEED Protocol: Smartcard-Based Payment with Encrypted Electronic Delivery
ISC '01 Proceedings of the 4th International Conference on Information Security
Establishing the business value of network security using analytical hierarchy process
Creating business value with information technology
Inductive verification of smart card protocols
Journal of Computer Security
Secrecy types for asymmetric communication
Theoretical Computer Science - Foundations of software science and computation structures
Design guidelines for robust Internet protocols
ACM SIGCOMM Computer Communication Review
How to prevent type flaw attacks on security protocols
Journal of Computer Security - CSFW13
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Authenticity by Typing for Security Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Availability of protocol goals
Proceedings of the 2003 ACM symposium on Applied computing
Authenticity by typing for security protocols
Journal of Computer Security - Special issue on CSFW14
Protocol Moderators as Active Middle-Agents in Multi-Agent Systems
Autonomous Agents and Multi-Agent Systems
Proceedings of the 2003 workshop on New security paradigms
Computer Security in the Real World
Computer
Soft constraint programming to analysing security protocols
Theory and Practice of Logic Programming
Authenticity by tagging and typing
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Stepwise development of security protocols: a speech act-oriented approach
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Theoretical Computer Science - Special issue: Foundations of wide area network computing
Analysis of Liberty Single-Sign-on with Enabled Clients
IEEE Internet Computing
Formal analysis of modern security protocols
Information Sciences—Informatics and Computer Science: An International Journal
Decidability of context-explicit security protocols
Journal of Computer Security - Special issue on WITS'03
Encyclopedia of Computer Science
Timed spi-calculus with types for secrecy and authenticity
CONCUR 2005 - Concurrency Theory
Establishing and protecting digital identity in federation systems
Proceedings of the 2005 workshop on Digital identity management
Tailoring the Dolev-Yao abstraction to web services realities
Proceedings of the 2005 workshop on Secure web services
Securing the deluge Network programming system
Proceedings of the 5th international conference on Information processing in sensor networks
A communication model for structural design objects. II: performatives and protocols
Advances in Engineering Software
Information and Computation
User centricity: a taxonomy and open issues
Proceedings of the second ACM workshop on Digital identity management
An intruder model for verifying liveness in security protocols
Proceedings of the fourth ACM workshop on Formal methods in security
Verification of cryptographic protocols: tagging enforces termination
Theoretical Computer Science - Foundations of software science and computation structures
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Establishing and protecting digital identity in federation systems
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Exclusions and related trust relationships in multi-party fair exchange protocols
Electronic Commerce Research and Applications
Constructing and Reasoning About Security Protocols Using Invariants
Electronic Notes in Theoretical Computer Science (ENTCS)
Breaking and fixing public-key Kerberos
Information and Computation
Dynamic types for authentication
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Security protocols, properties, and their monitoring
Proceedings of the fourth international workshop on Software engineering for secure systems
Trust-Rated Authentication for Domain-Structured Distributed Systems
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Tahoe: the least-authority filesystem
Proceedings of the 4th ACM international workshop on Storage security and survivability
A new fair non-repudiation protocol for secure negotiation and contract signing
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Safely composing security protocols
Formal Methods in System Design
Java-Based Mobile-Agent Systems in the Real World: Security Highlights
Proceedings of the 2005 conference on Self-Organization and Autonomic Informatics (I)
Automatic verification of correspondences for security protocols
Journal of Computer Security
Challenges in teaching a graduate course in applied cryptography
ACM SIGCSE Bulletin
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
Electronic Notes in Theoretical Computer Science (ENTCS)
Security of RFID Protocols -- A Case Study
Electronic Notes in Theoretical Computer Science (ENTCS)
A communication model for structural design objects. II: Performatives and protocols
Advances in Engineering Software
Some common attacks against certified email protocols and the countermeasures
Computer Communications
Verification of cryptographic Protocols: tagging enforces termination
FOSSACS'03/ETAPS'03 Proceedings of the 6th International conference on Foundations of Software Science and Computation Structures and joint European conference on Theory and practice of software
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Safely composing security protocols
FSTTCS'07 Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science
Breaking and fixing public-key Kerberos
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
Key establishment protocols using environmental and physiological data in wireless sensor networks
International Journal of Sensor Networks
Implementation and performance evaluation of the RSEP protocol on ARM and intel platforms
Proceedings of the 3rd international conference on Security of information and networks
Developing security protocols by refinement
Proceedings of the 17th ACM conference on Computer and communications security
Refinement types for secure implementations
ACM Transactions on Programming Languages and Systems (TOPLAS)
Requirements for security protocols
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Short Communication: A note on the security of PAP
Computer Communications
Honoring Carolyn Talcott's contributions to science
Formal modeling
Lightweight mobile agent authentication scheme for home network environments
CIS'04 Proceedings of the First international conference on Computational and Information Science
Federated identity-management protocols
Proceedings of the 11th international conference on Security Protocols
An authentication protocol for pervasive computing
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Authentication components: engineering experiences and guidelines
SP'04 Proceedings of the 12th international conference on Security Protocols
Toward a broader view of security protocols
SP'04 Proceedings of the 12th international conference on Security Protocols
The dancing bear: a new way of composing ciphers
SP'04 Proceedings of the 12th international conference on Security Protocols
Static analysis of authentication
Foundations of Security Analysis and Design III
On tolerant cryptographic constructions
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A formal security analysis of an OSA/Parlay authentication interface
FMOODS'05 Proceedings of the 7th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems
A machine-checked formalization of the random oracle model
TYPES'04 Proceedings of the 2004 international conference on Types for Proofs and Programs
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
Machine-checked security proofs of cryptographic signature schemes
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Secure composition of protocols
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
G2C: cryptographic protocols from goal-driven specifications
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Provably repairing the ISO/IEC 9798 standard for entity authentication
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Diffie-Hellman without difficulty
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
On the automated correction of security protocols susceptible to a replay attack
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
On the security of tan et al. serverless RFID authentication and search protocols
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Reverse Authentication in Financial Transactions and Identity Management
Mobile Networks and Applications
Provably repairing the ISO/IEC 9798 standard for entity authentication
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.01 |
We present principles for designing cryptographic protocols. The principles are neither necessary nor sufficient for correctness. They are however helpful, in that adherence to them would have prevented a number of published errors.Our principles are informal guidelines; they complement formal methods, but do not assume them. In order to demonstrate the actual applicability of these guidelines, we discuss some instructive examples from the literature.