Proceedings of the 1998 workshop on New security paradigms
Inductive analysis of the Internet protocol TLS
ACM Transactions on Information and System Security (TISSEC)
Secrecy by typing in security protocols
Journal of the ACM (JACM)
ACM Transactions on Computational Logic (TOCL)
Mobile values, new names, and secure communication
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
Constraint solving for bounded-process cryptographic protocol analysis
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Analyzing security protocols with secrecy types and logic programs
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Modelling audit security for Smart-Card payment schemes with UML-SEC
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Security analysis of the cliques protocols suites: first results
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Extended description techniques for security engineering
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
Finite-state analysis of two contract signing protocols
Theoretical Computer Science
Automated protocol verification in linear logic
Proceedings of the 4th ACM SIGPLAN international conference on Principles and practice of declarative programming
The verification of an industrial payment protocol: the SET purchase phase
Proceedings of the 9th ACM conference on Computer and communications security
Secure systems development based on the common criteria: the PalME project
Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering
Logical Cryptanalysis as a SAT Problem
Journal of Automated Reasoning
Secure systems development based on the common criteria: the PalME project
ACM SIGSOFT Software Engineering Notes
A Formal Security Model for Microprocessor Hardware
IEEE Transactions on Software Engineering
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
Petri nets in cryptographic protocols
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
A Method for Automatic Cryptographic Protocol Verification
IPDPS '00 Proceedings of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing
Soft Constraints for Security Protocol Analysis: Confidentiality
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Formal Eavesdropping and Its Computational Interpretation
TACS '01 Proceedings of the 4th International Symposium on Theoretical Aspects of Computer Software
WADT '01 Selected papers from the 15th International Workshop on Recent Trends in Algebraic Development Techniques
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
A Method for Secure Smartcard Applications
AMAST '02 Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
FORTE '02 Proceedings of the 22nd IFIP WG 6.1 International Conference Houston on Formal Techniques for Networked and Distributed Systems
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Encryption-Scheme Security in the Presence of Key-Dependent Messages
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Using Decision Procedures with a Higher-Order Logic
TPHOLs '01 Proceedings of the 14th International Conference on Theorem Proving in Higher Order Logics
Mechanical Proofs about a Non-repudiation Protocol
TPHOLs '01 Proceedings of the 14th International Conference on Theorem Proving in Higher Order Logics
Proving Hybrid Protocols Correct
TPHOLs '01 Proceedings of the 14th International Conference on Theorem Proving in Higher Order Logics
TYPES '00 Selected papers from the International Workshop on Types for Proofs and Programs
Analyzing Cryptographic Protocols in a Reactive Framework
VMCAI '02 Revised Papers from the Third International Workshop on Verification, Model Checking, and Abstract Interpretation
Formal Verification of the Horn-Preneel Micropayment Protocol
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
Cryptographically Sound and Machine-Assisted Verification of Security Protocols
STACS '03 Proceedings of the 20th Annual Symposium on Theoretical Aspects of Computer Science
Formal Security Analysis with Interacting State Machines
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
A Framework for the Analysis of Security Protocols
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Reasoning About Concurrent Systems Using Types
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
Secrecy Types for Asymmetric Communication
FoSSaCS '01 Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures
Mechanising a Protocol for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
LOPSTR '01 Selected papers from the 11th International Workshop on Logic Based Program Synthesis and Transformation
Automated Reasoning and the Verification of Security Protocols
TABLEAUX '99 Proceedings of the International Conference on Automated Reasoning with Analytic Tableaux and Related Methods
From Secrecy to Authenticity in Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Abstracting Cryptographic Protocols by Prolog Rules
SAS '01 Proceedings of the 8th International Symposium on Static Analysis
An Improved Constraint-Based System for the Verification of Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Inductive Analysis of the Internet Protocol TLS (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Lack of Explicitness Strikes Back
Revised Papers from the 8th International Workshop on Security Protocols
Making Sense of Specifications: The Formalization of SET
Revised Papers from the 8th International Workshop on Security Protocols
Revised Papers from the 9th International Workshop on Security Protocols
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
TCS '00 Proceedings of the International Conference IFIP on Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics
An Introduction to Dependent Type Theory
Applied Semantics, International Summer School, APPSEM 2000, Caminha, Portugal, September 9-15, 2000, Advanced Lectures
Analysis of Abuse-Free Contract Signing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
FME '02 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods - Getting IT Right
A Formal Security Model for Microprocessor Hardware
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
SET Cardholder Registration: The Secrecy Proofs
IJCAR '01 Proceedings of the First International Joint Conference on Automated Reasoning
Lazy Infinite-State Analysis of Security Protocols
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Intrusion-Tolerant Group Management in Enclaves
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
Verifying authentication protocol implementations
FMOODS '02 Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V
Inductive verification of smart card protocols
Journal of Computer Security
Secrecy types for asymmetric communication
Theoretical Computer Science - Foundations of software science and computation structures
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
Theoretical Computer Science
Analysis and Verification of Multi-Agent Interaction Protocols
APSEC '99 Proceedings of the Sixth Asia Pacific Software Engineering Conference
Models for Name-Passing Processes: Interleaving and Causal
LICS '00 Proceedings of the 15th Annual IEEE Symposium on Logic in Computer Science
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
I/O Automaton Models and Proofs for Shared-Key Communication Systems
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Types and Effects for Asymmetric Cryptographic Protocols
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Capturing Parallel Attacks within the Data Independence Framework
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Probabilistic Analysis of Anonymity
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Flaw and modification of the iKP electronic payment protocols
Information Processing Letters
Probabilistic algorithmic knowledge
Proceedings of the 9th conference on Theoretical aspects of rationality and knowledge
First-order verification of cryptographic protocols
Journal of Computer Security - CSFW13
How to prevent type flaw attacks on security protocols
Journal of Computer Security - CSFW13
A Tool for Lazy Verification of Security Protocols
Proceedings of the 16th IEEE international conference on Automated software engineering
A Security Analysis of the Cliques Protocols Suites
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Proving Secrecy is Easy Enough
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Protocol Insecurity with Finite Number of Sessions is NP-Complete
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Computing Symbolic Models for Verifying Cryptographic Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Authenticity by Typing for Security Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Information Processing Letters
Automatic testing equivalence verification of spi calculus specifications
ACM Transactions on Software Engineering and Methodology (TOSEM)
A composable cryptographic library with nested operations
Proceedings of the 10th ACM conference on Computer and communications security
Availability of protocol goals
Proceedings of the 2003 ACM symposium on Applied computing
Formal verification: an imperative step in the design of security protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Study on strand space model theory
Journal of Computer Science and Technology
Authenticity by typing for security protocols
Journal of Computer Security - Special issue on CSFW14
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
A semantics for web services authentication
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Building reliable, high-performance networks with the Nuprl proof development system
Journal of Functional Programming
Strategy for Verifying Security Protocols with Unbounded Message Size
Automated Software Engineering
An approach to the formal verification of the three-principal cryptographic protocols
ACM SIGOPS Operating Systems Review
An approach to analyzing availability properties of security protocols
Nordic Journal of Computing
Proceedings of the 2003 workshop on New security paradigms
Security properties: two agents are sufficient
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Models for name-passing processes: interleaving and causal
Information and Computation
Soft constraint programming to analysing security protocols
Theory and Practice of Logic Programming
We Present a Complete Study Involving in the One Hand
QSIC '04 Proceedings of the Quality Software, Fourth International Conference
New semantic model for authentication protocols in ASMs
Journal of Computer Science and Technology
Fast automatic synthesis of security protocols using backward search
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Analyzing security protocols with secrecy types and logic programs
Journal of the ACM (JACM)
Formal prototyping in early stages of protocol design
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Specification and formal verification of security requirements
CompSysTech '04 Proceedings of the 5th international conference on Computer systems and technologies
Tree automata with one memory set constraints and cryptographic protocols
Theoretical Computer Science - Automata, languages and programming
A collaborative approach to autonomic security protocols
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Decidability of context-explicit security protocols
Journal of Computer Security - Special issue on WITS'03
Relating Symbolic and Cryptographic Secrecy
IEEE Transactions on Dependable and Secure Computing
Deciding knowledge properties of security protocols
TARK '05 Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge
Timed spi-calculus with types for secrecy and authenticity
CONCUR 2005 - Concurrency Theory
A modular correctness proof of IEEE 802.11i and TLS
Proceedings of the 12th ACM conference on Computer and communications security
Tailoring the Dolev-Yao abstraction to web services realities
Proceedings of the 2005 workshop on Secure web services
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
Object Oriented Verification Kernels for Secure Java Applications
SEFM '05 Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods
Static validation of security protocols
Journal of Computer Security
Symbolic protocol analysis with an Abelian group operator or Diffie-Hellman exponentiation
Journal of Computer Security
Accountability protocols: Formalized and verified
ACM Transactions on Information and System Security (TISSEC)
Deriving the type flaw attacks in the Otway-Rees protocol by rewriting
Nordic Journal of Computing - Selected papers of the 17th nordic workshop on programming theory (NWPT'05), October 19-21, 2005
Nordic Journal of Computing - Selected papers of the 17th nordic workshop on programming theory (NWPT'05), October 19-21, 2005
Information and Computation
An intruder model for verifying liveness in security protocols
Proceedings of the fourth ACM workshop on Formal methods in security
Computationally sound secrecy proofs by mechanized flow analysis
Proceedings of the 13th ACM conference on Computer and communications security
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
A computational interpretation of Dolev-Yao adversaries
Theoretical Computer Science - Theoretical foundations of security analysis and design II
A semantics for web services authentication
Theoretical Computer Science - Theoretical foundations of security analysis and design II
Verification of cryptographic protocols: tagging enforces termination
Theoretical Computer Science - Foundations of software science and computation structures
Deciding knowledge in security protocols under equational theories
Theoretical Computer Science - Automated reasoning for security protocol analysis
On the semantics of Alice&Bob specifications of security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
A framework for security analysis of mobile wireless networks
Theoretical Computer Science - Automated reasoning for security protocol analysis
A (restricted) quantifier elimination for security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
A Logical Characterisation of Static Equivalence
Electronic Notes in Theoretical Computer Science (ENTCS)
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Higher-Order and Symbolic Computation
Secure sessions for Web services
ACM Transactions on Information and System Security (TISSEC)
A protocol to preserve a code of conduct
Proceedings of the 2007 ACM symposium on Applied computing
A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Just fast keying in the pi calculus
ACM Transactions on Information and System Security (TISSEC)
Temporal Logics of Knowledge and their Applications in Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Types and effects for asymmetric cryptographic protocols
Journal of Computer Security - Special issue on CSFW15
Probabilistic analysis of an anonymity system
Journal of Computer Security - Special issue on CSFW15
Embedding agents within the intruder to detect parallel attacks
Journal of Computer Security - Special issue on CSFW15
The reactive simulatability (RSIM) framework for asynchronous systems
Information and Computation
A formal semantics for protocol narrations
Theoretical Computer Science
Perfect cryptography, S5 knowledge, and algorithmic knowledge
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
Automatic verification of cryptographic protocols in first-order logic
ICAI'07 Proceedings of the 8th Conference on 8th WSEAS International Conference on Automation and Information - Volume 8
Constructing and Reasoning About Security Protocols Using Invariants
Electronic Notes in Theoretical Computer Science (ENTCS)
Fair multi-party contract signing using private contract signatures
Information and Computation
A framework for compositional verification of security protocols
Information and Computation
On the relationships between models in protocol verification
Information and Computation
A problem solving mechanism for formal analysis of cryptographic protocols
SMO'07 Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization
The Importance of Non-theorems and Counterexamples in Program Verification
Verified Software: Theories, Tools, Experiments
Combining Algorithms for Deciding Knowledge in Security Protocols
FroCoS '07 Proceedings of the 6th international symposium on Frontiers of Combining Systems
Implementing Spi Calculus Using Nominal Techniques
CiE '08 Proceedings of the 4th conference on Computability in Europe: Logic and Theory of Algorithms
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol
FORTE '08 Proceedings of the 28th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
Formalized Information-Theoretic Proofs of Privacy Using the HOL4 Theorem-Prover
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols
ABZ '08 Proceedings of the 1st international conference on Abstract State Machines, B and Z
Automating Interactive Protocol Verification
KI '08 Proceedings of the 31st annual German conference on Advances in Artificial Intelligence
Unguessable Atoms: A Logical Foundation for Security
VSTTE '08 Proceedings of the 2nd international conference on Verified Software: Theories, Tools, Experiments
Proceedings of the 15th ACM conference on Computer and communications security
Verifying distributed systems: the operational approach
Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
A Formal Language for Cryptographic Pseudocode
LPAR '08 Proceedings of the 15th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Complexity of Checking Freshness of Cryptographic Protocols
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Rewriting Techniques in the Constraint Solver
Electronic Notes in Theoretical Computer Science (ENTCS)
Verifying Multi-party Authentication Using Rank Functions and PVS
Formal Aspects in Security and Trust
Tools for cryptographic protocols analysis: A technical and experimental comparison
Computer Standards & Interfaces
Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives
Electronic Notes in Theoretical Computer Science (ENTCS)
Automatic verification of correspondences for security protocols
Journal of Computer Security
Automated deduction for verification
ACM Computing Surveys (CSUR)
A Complete Symbolic Bisimilarity for an Extended Spi Calculus
Electronic Notes in Theoretical Computer Science (ENTCS)
Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
Electronic Notes in Theoretical Computer Science (ENTCS)
Let's Get Physical: Models and Methods for Real-World Security Protocols
TPHOLs '09 Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics
Liveness Reasoning with Isabelle/HOL
TPHOLs '09 Proceedings of the 22nd International Conference on Theorem Proving in Higher Order Logics
Security protocols analysis: A SDL-based approach
Computer Standards & Interfaces
CoSP: a general framework for computational soundness proofs
Proceedings of the 16th ACM conference on Computer and communications security
Generating formal specifications for security-critical applications - A model-driven approach
IWSESS '09 Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems
Semantics and logic for security protocols
Journal of Computer Security
Correcting and Improving the NP Proof for Cryptographic Protocol Insecurity
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Bounded Model Generation for Isabelle/HOL
Electronic Notes in Theoretical Computer Science (ENTCS)
Analysing the BKE-security Protocol with μCRL
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
Metareasoning about Security Protocols using Distributed Temporal Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
Attacking Group Multicast Key Management Protocols Using Coral
Electronic Notes in Theoretical Computer Science (ENTCS)
Believing the Integrity of a System
Electronic Notes in Theoretical Computer Science (ENTCS)
On the Relative Soundness of the Free Algebra Model for Public Key Encryption
Electronic Notes in Theoretical Computer Science (ENTCS)
Approximating Imperfect Cryptography in a Formal Model
Electronic Notes in Theoretical Computer Science (ENTCS)
The ρ-spi Calculus at Work: Authentication Case Studies
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
A Trace Logic for Local Security Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
Modular verification of security protocol code by typing
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Stochastic Simulation Methods Applied to a Secure Electronic Voting Model
Electronic Notes in Theoretical Computer Science (ENTCS)
Automated Security Protocol Analysis With the AVISPA Tool
Electronic Notes in Theoretical Computer Science (ENTCS)
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
Electronic Notes in Theoretical Computer Science (ENTCS)
Enhanced strand space for secure protocol analysis
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Verification of cryptographic Protocols: tagging enforces termination
FOSSACS'03/ETAPS'03 Proceedings of the 6th International conference on Foundations of Software Science and Computation Structures and joint European conference on Theory and practice of software
RTA'03 Proceedings of the 14th international conference on Rewriting techniques and applications
Applying SDL to formal analysis of security systems
SDL'03 Proceedings of the 11th international conference on System design
Security in business process engineering
BPM'03 Proceedings of the 2003 international conference on Business process management
Compiling and verifying security protocols
LPAR'00 Proceedings of the 7th international conference on Logic for programming and automated reasoning
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Typing one-to-one and one-to-many correspondences in security protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Formal analysis of the iKP electronic payment protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Security properties: two agents are sufficient
ESOP'03 Proceedings of the 12th European conference on Programming
A new knowledge representation strategy for cryptographic protocol analysis
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
Verifying smart card applications: an ASM approach
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
Integrating verification, testing, and learning for cryptographic protocols
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
A refinement method for Java programs
FMOODS'07 Proceedings of the 9th IFIP WG 6.1 international conference on Formal methods for open object-based distributed systems
Timed calculus of cryptographic communication
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
On-the-fly model checking of fair non-repudiation protocols
ATVA'07 Proceedings of the 5th international conference on Automated technology for verification and analysis
Deciding knowledge in security protocols for monoidal equational theories
LPAR'07 Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning
How to do things with cryptographic protocols
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A type-theoretic framework for formal reasoning with different logical foundations
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
A logic programming based framework for security protocol verification
ISMIS'08 Proceedings of the 17th international conference on Foundations of intelligent systems
Analysis of EAP-GPSK authentication protocol
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Isabelle/HOL: a proof assistant for higher-order logic
Isabelle/HOL: a proof assistant for higher-order logic
A monad-based modeling and verification toolbox with application to security protocols
TPHOLs'07 Proceedings of the 20th international conference on Theorem proving in higher order logics
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
Calibrating the power of schedulers for probabilistic polynomial-time calculus
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Using deductive knowledge to improve cryptographic protocol verification
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Developing security protocols by refinement
Proceedings of the 17th ACM conference on Computer and communications security
Computationally sound verification of source code
Proceedings of the 17th ACM conference on Computer and communications security
Computational soundness of symbolic zero-knowledge proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Automated refinement of security protocols
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
A correctness proof of the SRP protocal
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Multi-Attacker Protocol Validation
Journal of Automated Reasoning
Beyond provable security verifiable IND-CCA security of OAEP
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
A typed specification for security protocols
DNCOCO'06 Proceedings of the 5th WSEAS international conference on Data networks, communications and computers
A formal semantics for protocol narrations
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Formal Reasoning about Physical Properties of Security Protocols
ACM Transactions on Information and System Security (TISSEC)
Computer-aided security proofs for the working cryptographer
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
Logical formalisation and analysis of the mifare classic card in PVS
ITP'11 Proceedings of the Second international conference on Interactive theorem proving
A secure internet voting scheme
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Computational soundness about formal encryption in the presence of secret shares and key cycles
ICICS'11 Proceedings of the 13th international conference on Information and communications security
A protocol's life after attacks...
Proceedings of the 11th international conference on Security Protocols
Proceedings of the 11th international conference on Security Protocols
Is the verification problem for cryptographic protocols solved?
Proceedings of the 11th international conference on Security Protocols
From security protocols to systems security
Proceedings of the 11th international conference on Security Protocols
Biometrics to enhance smartcard security
Proceedings of the 11th international conference on Security Protocols
Verifying a chipcard-based biometric identification protocol in VSE
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Developing provable secure m-commerce applications
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Game semantics model for security protocols
ICFEM'05 Proceedings of the 7th international conference on Formal Methods and Software Engineering
A temporalised belief logic for specifying the dynamics of trust for multi-agent systems
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
SeVe: automatic tool for verification of security protocols
Frontiers of Computer Science in China
A new mobile payment system with formal verification
International Journal of Internet Technology and Secured Transactions
Verifying a hotel key card system
ICTAC'06 Proceedings of the Third international conference on Theoretical Aspects of Computing
Integrating automated and interactive protocol verification
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
Towards a formal treatment of secrecy against computational adversaries
GC'04 Proceedings of the 2004 IST/FET international conference on Global Computing
Automatic detection of attacks on cryptographic protocols: a case study
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
The AVISPA tool for the automated validation of internet security protocols and applications
CAV'05 Proceedings of the 17th international conference on Computer Aided Verification
Deduction with XOR constraints in security API modelling
CADE' 20 Proceedings of the 20th international conference on Automated Deduction
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
A generic model for analyzing security protocols
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Limits of the cryptographic realization of dolev-yao-style XOR
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Browser model for security analysis of browser-based protocols
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
The inductive approach to strand space
FORTE'05 Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
Deriving secrecy in key establishment protocols
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Limits of the BRSIM/UC soundness of dolev-yao models with hashes
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Proof-Based design of security protocols
CSR'10 Proceedings of the 5th international conference on Computer Science: theory and Applications
Computational soundness, co-induction, and encryption cycles
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
The mondex challenge: machine checked proofs for an electronic purse
FM'06 Proceedings of the 14th international conference on Formal Methods
Formal methods for security: lightweight plug-in or new engineering discipline
FM'06 Proceedings of the 14th international conference on Formal Methods
Model-based security engineering for real
FM'06 Proceedings of the 14th international conference on Formal Methods
Security protocols verification in abductive logic programming: a case study
ESAW'05 Proceedings of the 6th international conference on Engineering Societies in the Agents World
Cryptographic protocols analysis in event b
PSI'09 Proceedings of the 7th international Andrei Ershov Memorial conference on Perspectives of Systems Informatics
Formal verification of application-specific security properties in a model-driven approach
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
Formal privacy analysis of communication protocols for identity management
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
On anonymity with identity escrow
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
A sound decision procedure for the compositionality of secrecy
ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
Decidability and Combination Results for Two Notions of Knowledge in Security Protocols
Journal of Automated Reasoning
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Calculus of cooperation and game-based reasoning about protocol privacy
ACM Transactions on Computational Logic (TOCL)
Game-based verification of contract signing protocols with minimal messages
Innovations in Systems and Software Engineering
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Computational soundness without protocol restrictions
Proceedings of the 2012 ACM conference on Computer and communications security
Timed traces and strand spaces
CSR'07 Proceedings of the Second international conference on Computer Science: theory and applications
Verification of distributed applications
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Completeness of the authentication tests
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
On the automated correction of security protocols susceptible to a replay attack
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Incremental development of large, secure smart card applications
Proceedings of the Workshop on Model-Driven Security
Towards verifying voter privacy through unlinkability
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Verifying multicast-based security protocols using the inductive method
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Design and formal verification of a CEM protocol with transparent TTP
Frontiers of Computer Science: Selected Publications from Chinese Universities
MaSh: machine learning for sledgehammer
ITP'13 Proceedings of the 4th international conference on Interactive Theorem Proving
A new hierarchical and scalable group key exchange protocol with XOR operation
International Journal of Wireless and Mobile Computing
A formal methodology for integral security design and verification of network protocols
Journal of Systems and Software
Fast automatic security protocol generation
Journal of Computer Security
Establishing and preserving protocol security goals
Journal of Computer Security - Foundational Aspects of Security
Efficient construction of machine-checked symbolic protocol security proofs
Journal of Computer Security
Hi-index | 0.00 |
Informal arguments that cryptographic protocols are secure canbe made rigorous using inductive definitions. The approach is basedon ordinary predicate calculus and copes with infinite-statesystems. Proofs are generated using Isabelle/HOL. The human effortrequired to analyze a protocol can be as little as a week or two,yielding a proof script that takes a few minutes to run.Protocols are inductively defined as sets of traces. A trace isa list of communication events, perhaps comprising many interleavedprotocol runs. Protocol descriptions incorporate attacks andaccidental losses. The model spy knows some private keys and canforge messages using components decrypted from previous traffic.Three protocols are analyzed below: Otway-Rees (which usesshared-key encryption), Needham-Schroeder (which uses public-keyencryption), and a recursive protocol (Bull and Otway, 1997) (whichis of variable length).One can prove that event ev always precedes event ev' or thatproperty P holds provided X remains secret. Properties can beproved from the viewpoint of the various principals: say, if Areceives a final message from B then the session key it conveys isgood.