A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Encryption-based protection for interactive user/computer communication
SIGCOMM '77 Proceedings of the fifth symposium on Data communications
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
ENCRYPTION-BASED PROTECTION PROTOCOLS FOR INTERACTIVE USER-COMPUTER COMMUNICATION
A Butler process for resource sharing on Spice machines
ACM Transactions on Information Systems (TOIS)
Communications of the ACM
Extending a capability based system into a network environment
SIGCOMM '86 Proceedings of the ACM SIGCOMM conference on Communications architectures & protocols
The role of encipherment services in distributed systems
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
User functions for the generation and distribution of encipherment keys
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
ACM SIGOPS Operating Systems Review
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
A distributed repository for immutable persistent objects
OOPLSA '86 Conference proceedings on Object-oriented programming systems, languages and applications
Proceedings on Advances in cryptology---CRYPTO '86
A model to order the encryption algorithms according to their quality
ACM SIGCOMM Computer Communication Review
Remote pipes and procedures for efficient distributed communication
ACM Transactions on Computer Systems (TOCS)
Zero-knowledge proofs of identity and veracity of transaction receipts
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
Authentication Mechanisms in Microprocessor-Based Local Area Networks
IEEE Transactions on Software Engineering
Using one-way functions for authentication
ACM SIGCOMM Computer Communication Review
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Reducing risks from poorly chosen keys
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
Construction of internet for Japanese academic communities
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
ACM Transactions on Computer Systems (TOCS)
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
Developing Ethernet Enhanced-Security System
CRYPTO '88 Proceedings on Advances in cryptology
Network security via private-key certificates
ACM SIGOPS Operating Systems Review
Distributed file systems: concepts and examples
ACM Computing Surveys (CSUR)
Practical uses of synchronized clocks in distributed systems
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
The use of encryption in Kerberos for network authentication (invited)
CRYPTO '89 Proceedings on Advances in cryptology
Authentication in distributed systems: theory and practice
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
The Influence of Scale on Distributed File System Design
IEEE Transactions on Software Engineering
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Project Athena: supporting distributed computing at MIT
IBM Systems Journal
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Message authentication with one-way hash functions
ACM SIGCOMM Computer Communication Review
A nonce-based protocol for multiple authentications
ACM SIGOPS Operating Systems Review
Open commit protocols tolerating commission failures
ACM Transactions on Database Systems (TODS)
Integration of security in network routing protocols
ACM SIGSAC Review
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Making distributed multimedia systems secure: the switchboard approach
ACM SIGOPS Operating Systems Review
Lower bounds on messages and rounds for network authentication protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Optimality of multi-domain protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On simple and secure key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Towards practical “proven secure” authenticated key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Extensible access control for a hierarchy of servers
ACM SIGOPS Operating Systems Review
Optimal privacy and authentication on a portable communications system
ACM SIGOPS Operating Systems Review
New protocols for third-party-based authentication and secure broadcast
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A security architecture for fault-tolerant systems
ACM Transactions on Computer Systems (TOCS) - Special issue on computer architecture
An efficient and secure authentication protocol using uncertified keys
ACM SIGOPS Operating Systems Review
Refinement and extension of encrypted key exchange
ACM SIGOPS Operating Systems Review
Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
The KryptoKnight family of light-weight protocols for authentication and key distribution
IEEE/ACM Transactions on Networking (TON)
Managing update conflicts in Bayou, a weakly connected replicated storage system
SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Communications of the ACM
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
ACM SIGOPS Operating Systems Review
Security on the move: indirect authentication using Kerberos
MobiCom '96 Proceedings of the 2nd annual international conference on Mobile computing and networking
An approach to the formal verification of cryptographic protocols
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Supporting multi-user, multi-applet workspaces in CBE
CSCW '96 Proceedings of the 1996 ACM conference on Computer supported cooperative work
Anonymous credit cards and their collusion analysis
IEEE/ACM Transactions on Networking (TON)
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
Authentication services for computer networks and electronic messaging systems
ACM SIGOPS Operating Systems Review
IEEE Transactions on Software Engineering
On the properties of cryptographic protocols and the weaknesses of the BAN-like logics
ACM SIGOPS Operating Systems Review
Extending NCP for protocols using public keys
Mobile Networks and Applications - Special issue: protocols for mobile environments
A Metaobject Architecture for Fault-Tolerant Distributed Systems: The FRIENDS Approach
IEEE Transactions on Computers
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Verifying Authentication Protocols in CSP
IEEE Transactions on Software Engineering
A probabilistic poly-time framework for protocol analysis
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Fixing a problem in the Helsinki protocol
ACM SIGOPS Operating Systems Review
Using the ASTRAL model checker to analyze mobile IP
Proceedings of the 21st international conference on Software engineering
Comparing lower bounds on messages and rounds for two classes of key establishment protocols
ACM SIGCOMM Computer Communication Review
Clarifying straight replays and forced delays
ACM SIGOPS Operating Systems Review
Secure protocol transformation via “expansion”: from two-party to groups
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Authentication primitives and their compilation
Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
An authentication-combined access control scheme using a geometric approach in distributed systems
SAC '97 Proceedings of the 1997 ACM symposium on Applied computing
An approach to the formal verification of the two-party cryptographic protocols
ACM SIGOPS Operating Systems Review
Paradigm shifts in protocol analysis
Proceedings of the 1999 workshop on New security paradigms
An architecture for distributed OASIS services
IFIP/ACM International Conference on Distributed systems platforms
Towards a secure platform for distributed mobile object computing
ACM SIGOPS Operating Systems Review
ACM Computing Surveys (CSUR)
Symmetric and Asymmetric Encryption
ACM Computing Surveys (CSUR)
Encryption and Secure Computer Networks
ACM Computing Surveys (CSUR)
ACM Computing Surveys (CSUR)
Security Mechanisms in High-Level Network Protocols
ACM Computing Surveys (CSUR)
A key distribution protocol using event markers
ACM Transactions on Computer Systems (TOCS)
Computation and communication in R*: a distributed database manager
ACM Transactions on Computer Systems (TOCS)
End-to-end arguments in system design
ACM Transactions on Computer Systems (TOCS)
Authentication in office system internetworks
ACM Transactions on Information Systems (TOIS)
The clearinghouse: a decentralized agent for locating named objects in a distributed environment
ACM Transactions on Information Systems (TOIS)
Grapevine: an exercise in distributed computing
Communications of the ACM
Cryptographic sealing for information secrecy and authentication
Communications of the ACM
Timestamps in key distribution protocols
Communications of the ACM
Authentication of signatures using public key encryption
Communications of the ACM
Secure personal computing in an insecure network
Communications of the ACM
Programming language methods in computer security
POPL '01 Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Verifying security protocols with Brutus
ACM Transactions on Software Engineering and Methodology (TOSEM)
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Dynamic analysis of security protocols
Proceedings of the 2000 workshop on New security paradigms
Using SMV for cryptographic protocol analysis: a case study
ACM SIGOPS Operating Systems Review
A note on redundancy in encrypted messages
ACM SIGCOMM Computer Communication Review
Protection in a distributed document processing system
ACM SIGOPS Operating Systems Review
Inductive methods and contract-signing protocols
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Analyzing security protocols with secrecy types and logic programs
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
ACM Transactions on Information and System Security (TISSEC)
Experimenting with STA, a tool for automatic analysis of security protocols
Proceedings of the 2002 ACM symposium on Applied computing
Authentication tests and the structure of bundles
Theoretical Computer Science
Zero-interaction authentication
Proceedings of the 8th annual international conference on Mobile computing and networking
Secure implementation of channel abstractions
Information and Computation
A methodology for analyzing the performance of authentication protocols
ACM Transactions on Information and System Security (TISSEC)
An environment for security protocol intrusion detection
Journal of Computer Security
Case Studies in Security and Resource Management for Mobile Object Systems
Autonomous Agents and Multi-Agent Systems
A Protocol for Establishing Secure Communication Channels in a Large Network
IEEE Transactions on Knowledge and Data Engineering
Flow logic for Dolev-Yao secrecy in cryptographic processes
Future Generation Computer Systems - Parallel computing technologies (PaCT-2001)
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis
ESOP '01 Proceedings of the 10th European Symposium on Programming Languages and Systems
Specifying Authentication Protocols Using Rewriting and Strategies
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Soft Constraints for Security Protocol Analysis: Confidentiality
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Using SPIN to Verify Security Properties of Cryptographic Protocols
Proceedings of the 9th International SPIN Workshop on Model Checking of Software
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
Conference Key Agreement from Secret Sharing
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Proof Techniques for Cryptographic Protocols
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Notes on Nominal Calculi for Security and Mobility
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
FLOPS '01 Proceedings of the 5th International Symposium on Functional and Logic Programming
Analysis of a Security Protocol in µCRL
ICFEM '02 Proceedings of the 4th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
On the Distribution of a Key Distribution Center
ICTCS '01 Proceedings of the 7th Italian Conference on Theoretical Computer Science
Applying NCP Logic to the Analysis of SSL 3.0
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Partial Order Reductions for Security Protocol Verification
TACAS '00 Proceedings of the 6th International Conference on Tools and Algorithms for Construction and Analysis of Systems: Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000
Model Checking: A Tutorial Overview
MOVEP '00 Proceedings of the 4th Summer School on Modeling and Verification of Parallel Processes
Exploring Very Large State Spaces Using Genetic Algorithms
TACAS '02 Proceedings of the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
Typed MSR: Syntax and Examples
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Security Protocols and Specifications
FoSSaCS '99 Proceedings of the Second International Conference on Foundations of Software Science and Computation Structure, Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS'99
On the Security of Ping-Pong Protocols when Implemented using the RSA
CRYPTO '85 Advances in Cryptology
Symmetric Public-Key Encryption
CRYPTO '85 Advances in Cryptology
Secrecy Types for Asymmetric Communication
FoSSaCS '01 Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures
How to Make Replicated Data Secure
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
A Modular Approach to Key Distribution
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
A Calculus for Access Control in Distributed Systems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Secret-Key Agreement without Public-Key Cryptography
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Entity Authentication and Key Distribution
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
LOPSTR '01 Selected papers from the 11th International Workshop on Logic Based Program Synthesis and Transformation
Automated Reasoning and the Verification of Security Protocols
TABLEAUX '99 Proceedings of the International Conference on Automated Reasoning with Analytic Tableaux and Related Methods
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
From Secrecy to Authenticity in Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On Unconditionally Secure Robust Distributed Key Distribution Centers
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Multiset Rewriting and Security Protocol Analysis
RTA '02 Proceedings of the 13th International Conference on Rewriting Techniques and Applications
Insider Fraud (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Broadening the Scope of Fault Tolerance within Secure Services
Revised Papers from the 8th International Workshop on Security Protocols
Making Sense of Specifications: The Formalization of SET
Revised Papers from the 8th International Workshop on Security Protocols
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature
SAFECOMP '99 Proceedings of the 18th International Conference on Computer Computer Safety, Reliability and Security
Mutual Authentication for Low-Power Mobile Devices
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Interference Analysis for Dependable Systems Using Refinement and Abstraction
FME '02 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods - Getting IT Right
Probabilistic Polynomial-Time Equivalence and Security Analysis
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
The Expressive Power of Horn Monadic Linear Logic
CSL '01 Proceedings of the 15th International Workshop on Computer Science Logic
Classification of Authentication Protocols: A Practical Approach
ISW '00 Proceedings of the Third International Workshop on Information Security
ISC '01 Proceedings of the 4th International Conference on Information Security
Efficient Kerberized Multicast in a Practical Distributed Setting
ISC '01 Proceedings of the 4th International Conference on Information Security
A Distributed and Computationally Secure Key Distribution Scheme
ISC '02 Proceedings of the 5th International Conference on Information Security
Lazy Infinite-State Analysis of Security Protocols
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Thwarting Timing Attacks Using ATM Networks
Revised Papers from the 9th International Workshop on Security Protocols
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
Model checking: a tutorial overview
Modeling and verification of parallel processes
Verifying authentication protocol implementations
FMOODS '02 Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V
Secrecy types for asymmetric communication
Theoretical Computer Science - Foundations of software science and computation structures
A HOL extension of GNY for automatically analyzing cryptographic protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Language generation and verification in the NRL protocol analyzer
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A Meta-Notation for Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CVS: A Compiler for the Analysis of Cryptographic Protocols
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Strand Spaces and Rank Functions: More than Distant Cousins
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Types and Effects for Asymmetric Cryptographic Protocols
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Filing and printing services on a local-area network
SIGCOMM '83 Proceedings of the eighth symposium on Data communications
Resource management in a distributed system
SIGCOMM '83 Proceedings of the eighth symposium on Data communications
Design considerations for a processing server
ISCA '81 Proceedings of the 8th annual symposium on Computer Architecture
STOC '82 Proceedings of the fourteenth annual ACM symposium on Theory of computing
Some cryptographic principles of authentication in electronic funds transfer systems
SIGCOMM '81 Proceedings of the seventh symposium on Data communications
WFS a simple shared file system for a distributed environment
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
Primitives for distributed computing
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
Sequencing computation steps in a network
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
UIDs as internal names in a distributed file system
PODC '82 Proceedings of the first ACM SIGACT-SIGOPS symposium on Principles of distributed computing
Misplaced Trust: Kerberos 4 Session Keys
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
A privilege management and enforcement system for distributed resource sharing
WET-ICE '96 Proceedings of the 5th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'96)
An Adaptable and Reliable Authentication Protocol for Communication Networks
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
INFOCOM '97 Proceedings of the INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution
Flaw and modification of the iKP electronic payment protocols
Information Processing Letters
Teaching secure communication protocols using a game representation
ACE '03 Proceedings of the fifth Australasian conference on Computing education - Volume 20
IEEE Pervasive Computing
How to prevent type flaw attacks on security protocols
Journal of Computer Security - CSFW13
A ramp model for distributed key distribution schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Proving Secrecy is Easy Enough
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Relating Cryptography and Cryptographic Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A Compositional Logic for Protocol Correctness
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Extending NCP for protocols using public keys
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Efficient protocols secure against guessing and replay attacks
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Automatic verification of cryptographic protocols: a logic programming approach
Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming
A composable cryptographic library with nested operations
Proceedings of the 10th ACM conference on Computer and communications security
Formal verification: an imperative step in the design of security protocols
Computer Networks: The International Journal of Computer and Telecommunications Networking
Logical relation for encryption
Journal of Computer Security - Special issue on CSFW14
A compositional logic for proving security properties of protocols
Journal of Computer Security - Special issue on CSFW14
A bisimulation for dynamic sealing
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A semantics for web services authentication
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Using backward strategy to the Needham-Schroeder public key protocol verification
Artificial intelligence and security in computing systems
Grid resource management
Proceedings of the 2003 workshop on New security paradigms
Security support for in-network processing in Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
Password-based user authentication and key distribution protocols for client-server applications
Journal of Systems and Software
The internet public key infrastructure
IBM Systems Journal - End-to-end security
Multiset rewriting and the complexity of bounded security protocols
Journal of Computer Security
Design of a CIL Connector to SPIN
COMPSAC '04 Proceedings of the 28th Annual International Computer Software and Applications Conference - Volume 01
Authentication: a practical study in belief and action
TARK '88 Proceedings of the 2nd conference on Theoretical aspects of reasoning about knowledge
Verifying policy-based security for web services
Proceedings of the 11th ACM conference on Computer and communications security
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
Design of an authentication service
ACM SIGCOMM Computer Communication Review
Theoretical Computer Science - Special issue: Foundations of wide area network computing
Analyzing security protocols with secrecy types and logic programs
Journal of the ACM (JACM)
Specifying Kerberos 5 cross-realm authentication
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Using static analysis to validate the SAML single sign-on protocol
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Specification and formal verification of security requirements
CompSysTech '04 Proceedings of the 5th international conference on Computer systems and technologies
Formal analysis of modern security protocols
Information Sciences—Informatics and Computer Science: An International Journal
DART: directed automated random testing
Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
Protecting applications with transient authentication
Proceedings of the 1st international conference on Mobile systems, applications and services
Relating multiset rewriting and process algebras for security protocol analysis
Journal of Computer Security - Special issue on WITS'03
Decidability of context-explicit security protocols
Journal of Computer Security - Special issue on WITS'03
A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures
PPDP '05 Proceedings of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming
Preventing type flaw attacks on security protocols with a simplified tagging scheme
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
Encyclopedia of Computer Science
A comparison between strand spaces and multiset rewriting for security protocol analysis
Journal of Computer Security
A decision procedure for the existence of a rank function
Journal of Computer Security
Practical uses of synchronized clocks in distributed systems
Distributed Computing
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
ACM Transactions on Information and System Security (TISSEC)
An NP decision procedure for protocol insecurity with XOR
Theoretical Computer Science
The study on the application of BAN logic in formal analysis of authentication protocols
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
Deciding knowledge properties of security protocols
TARK '05 Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge
Timed spi-calculus with types for secrecy and authenticity
CONCUR 2005 - Concurrency Theory
Secrecy types for a simulatable cryptographic library
Proceedings of the 12th ACM conference on Computer and communications security
An authentication method for interaction between personal servers based on the exchange of addresses
Proceedings of the 2005 workshop on Digital identity management
An advisor for web services security policies
Proceedings of the 2005 workshop on Secure web services
Proving a WS-federation passive requestor profile with a browser model
Proceedings of the 2005 workshop on Secure web services
A rewriting-based inference system for the NRL protocol analyzer: grammar generation
Proceedings of the 2005 ACM workshop on Formal methods in security engineering
Secure sessions for web services
SWS '04 Proceedings of the 2004 workshop on Secure web service
Proving a WS-Federation passive requestor profile
SWS '04 Proceedings of the 2004 workshop on Secure web service
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Proceedings of the 4th international conference on Mobile systems, applications and services
To infinity and beyond or, avoiding the infinite in security protocol analysis
Proceedings of the 2006 ACM symposium on Applied computing
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
Theoretical Computer Science
Static validation of security protocols
Journal of Computer Security
A derivation system and compositional logic for security protocols
Journal of Computer Security
On the impossibility of building secure cliques-type authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW17
SKMA: a key management architecture for SCADA systems
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Protecting file systems with transient authentication
Wireless Networks
Deriving the type flaw attacks in the Otway-Rees protocol by rewriting
Nordic Journal of Computing - Selected papers of the 17th nordic workshop on programming theory (NWPT'05), October 19-21, 2005
Password-based authentication and key distribution protocols with perfect forward secrecy
Journal of Computer and System Sciences
Computationally sound secrecy proofs by mechanized flow analysis
Proceedings of the 13th ACM conference on Computer and communications security
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
A semantics for web services authentication
Theoretical Computer Science - Theoretical foundations of security analysis and design II
Verification of cryptographic protocols: tagging enforces termination
Theoretical Computer Science - Foundations of software science and computation structures
An integrated approach to federated identity and privilege management in open systems
Communications of the ACM - Spam and the ongoing battle for the inbox
Improving the security of industrial networks by means of formal verification
Computer Standards & Interfaces
Theoretical Computer Science - Automated reasoning for security protocol analysis
Injective synchronisation: an extension of the authentication hierarchy
Theoretical Computer Science - Automated reasoning for security protocol analysis
A rewriting-based inference system for the NRL Protocol analyzer and its meta-logical properties
Theoretical Computer Science - Automated reasoning for security protocol analysis
A (restricted) quantifier elimination for security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
Electronic Notes in Theoretical Computer Science (ENTCS)
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
A bisimulation for dynamic sealing
Theoretical Computer Science
Secure sessions for Web services
ACM Transactions on Information and System Security (TISSEC)
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
Narrowing and Rewriting Logic: from Foundations to Applications
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure coprocessor integration with kerberos V5
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Kerberized credential translation: a solution to web access control
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
USITS'99 Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Just fast keying in the pi calculus
ACM Transactions on Information and System Security (TISSEC)
A resilient access control scheme for secure electronic transactions
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A set of protocols for micropayments in distributed systems
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
SNP: an interface for secure network programming
USTC'94 Proceedings of the USENIX Summer 1994 Technical Conference on USENIX Summer 1994 Technical Conference - Volume 1
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Kerberos security with clocks adrift
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Joining security realms: a single login for netware and kerberos
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Kerberized credential translation: a solution to web access control
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Implementation of IPv6 in 4.4 BSD
ATEC '96 Proceedings of the 1996 annual conference on USENIX Annual Technical Conference
Temporal Logics of Knowledge and their Applications in Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Simulation Based Validation Of Authentication Protocols
Journal of Integrated Design & Process Science
Finding safety errors with ACO
Proceedings of the 9th annual conference on Genetic and evolutionary computation
SLEDE: lightweight verification of sensor network security protocol implementations
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Types and effects for asymmetric cryptographic protocols
Journal of Computer Security - Special issue on CSFW15
Communication-efficient AUTHMAC_DH protocols
Computer Standards & Interfaces
Noninvasive Methods for Host Certification
ACM Transactions on Information and System Security (TISSEC)
Replication attack on random key pre-distribution schemes for wireless sensor networks
Computer Communications
Formalising theories of trust for authentication protocols
Information Systems Frontiers
Constructing and Reasoning About Security Protocols Using Invariants
Electronic Notes in Theoretical Computer Science (ENTCS)
Cryptographic logical relations
Theoretical Computer Science
Symbolic protocol analysis for monoidal equational theories
Information and Computation
Breaking and fixing public-key Kerberos
Information and Computation
A framework for compositional verification of security protocols
Information and Computation
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
Secure collaborations over message boards
International Journal of Security and Networks
A secure remote database backup system
AIKED'06 Proceedings of the 5th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
An authentication and validation mechanism for analyzing syslogs forensically
ACM SIGOPS Operating Systems Review
Modeling and Verifying Time Sensitive Security Protocols with Constraints
Electronic Notes in Theoretical Computer Science (ENTCS)
Challenges and architectural approaches for authenticating mobile users
Proceedings of the 1st international workshop on Software architectures and mobility
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
IEEE/ACM Transactions on Networking (TON)
Decentralized access control in distributed file systems
ACM Computing Surveys (CSUR)
Verifying policy-based web services security
ACM Transactions on Programming Languages and Systems (TOPLAS)
A distributed expansible authentication model based on Kerberos
Journal of Network and Computer Applications
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
A hybrid cryptosystem based on WEP for 802.11 networks
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
Model Checking and Artificial Intelligence
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
PETRI NETS '08 Proceedings of the 29th international conference on Applications and Theory of Petri Nets
Celf --- A Logical Framework for Deductive and Concurrent Systems (System Description)
IJCAR '08 Proceedings of the 4th international joint conference on Automated Reasoning
Partial Evaluation of PEPA Models for Fluid-Flow Analysis
EPEW '08 Proceedings of the 5th European Performance Engineering Workshop on Computer Performance Engineering
Verified interoperable implementations of security protocols
ACM Transactions on Programming Languages and Systems (TOPLAS)
Cryptographically verified implementations for TLS
Proceedings of the 15th ACM conference on Computer and communications security
Distributed marketplaces using P2P networks and public-key cryptography
Proceedings of the 3rd international conference on Scalable information systems
Security in Distributed Applications
Advances in Software Engineering
Dissecting the Meaning of an Encrypted Message: An Approach to Discovering the Goals of an Adversary
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
Securing frame communication in browsers
SS'08 Proceedings of the 17th conference on Security symposium
The implementation of a cryptography-based secure office system
AFIPS '82 Proceedings of the June 7-10, 1982, national computer conference
Safely composing security protocols
Formal Methods in System Design
DNCOCO'08 Proceedings of the 7th conference on Data networks, communications, computers
Verification of Security Protocols
VMCAI '09 Proceedings of the 10th International Conference on Verification, Model Checking, and Abstract Interpretation
Information Sciences: an International Journal
Evolutionary design of secrecy amplification protocols for wireless sensor networks
Proceedings of the second ACM conference on Wireless network security
Securing frame communication in browsers
Communications of the ACM - One Laptop Per Child: Vision vs. Reality
Rewriting Techniques in the Constraint Solver
Electronic Notes in Theoretical Computer Science (ENTCS)
Journal of Systems Architecture: the EUROMICRO Journal
Verification of authentication protocols for epistemic goals via SAT compilation
Journal of Computer Science and Technology
Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols
Formal to Practical Security
Comparing State Spaces in Automatic Security Protocol Analysis
Formal to Practical Security
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
AFRICACRYPT '09 Proceedings of the 2nd International Conference on Cryptology in Africa: Progress in Cryptology
Automatic verification of correspondences for security protocols
Journal of Computer Security
Relating state-based and process-based concurrency through linear logic (full-version)
Information and Computation
Energy-Efficient Implementation of ECDH Key Exchange for Wireless Sensor Networks
WISTP '09 Proceedings of the 3rd IFIP WG 11.2 International Workshop on Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks
Variable forgetting in reasoning about knowledge
Journal of Artificial Intelligence Research
Knowledge based approach for mechanically verifying security protocols
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Random Test Run Length and Effectiveness
ASE '08 Proceedings of the 2008 23rd IEEE/ACM International Conference on Automated Software Engineering
Secret instantiation in ad-hoc networks
Computer Communications
Computer Standards & Interfaces
Physically restricted authentication with trusted hardware
Proceedings of the 2009 ACM workshop on Scalable trusted computing
Deciding security properties for cryptographic protocols. application to key cycles
ACM Transactions on Computational Logic (TOCL)
Analysis of authentication protocols in agent-based systems using labeled tableaux
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on cybernetics and cognitive informatics
Semantics and logic for security protocols
Journal of Computer Security
An overview of computer security
IBM Systems Journal
Compiling and securing cryptographic protocols
Information Processing Letters
KSSL: experiments in wireless internet security
KSSL: experiments in wireless internet security
A Data Symmetry Reduction Technique for Temporal-epistemic Logic
ATVA '09 Proceedings of the 7th International Symposium on Automated Technology for Verification and Analysis
Improving Automatic Verification of Security Protocols with XOR
ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
A Syntactic Criterion for Injectivity of Authentication Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
Satisfiability of Dolev-Yao Constraints
Electronic Notes in Theoretical Computer Science (ENTCS)
Attacking Group Multicast Key Management Protocols Using Coral
Electronic Notes in Theoretical Computer Science (ENTCS)
Rule-based Programming in Java For Protocol Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
The ρ-spi Calculus at Work: Authentication Case Studies
Electronic Notes in Theoretical Computer Science (ENTCS)
Modular verification of security protocol code by typing
Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Real-or-random Key Secrecy of the Otway-Rees Protocol via a Symbolic Security Proof
Electronic Notes in Theoretical Computer Science (ENTCS)
Completeness and Counter-Example Generations of a Basic Protocol Logic
Electronic Notes in Theoretical Computer Science (ENTCS)
On the security of SPLICE/AS - The authentication system in WIDE Internet
Information Processing Letters
A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Enhanced strand space for secure protocol analysis
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
Fault-tolerant authentication services
International Journal of Computers and Applications
Parsing ambiguities in authentication and key establishment protocols
International Journal of Electronic Security and Digital Forensics
Session key distribution using smart cards
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
The GCHQ protocol and its problems
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A formal approach to security architectures
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Discrete logarithm based protocols
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Computationally secure two-round authenticated message exchange
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Distributed Pseudo-random functions and KDCs
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A practical study on security of agent-based ubiquitous computing
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Secure remote user authentication scheme using bilinear pairings
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Searching for shapes in cryptographic protocols
TACAS'07 Proceedings of the 13th international conference on Tools and algorithms for the construction and analysis of systems
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Hiding names: private authentication in the applied pi calculus
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A comparison between strand spaces and multiset rewriting for security protocol analysis
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Data access specification and the most powerful symbolic attacker in MSR
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A logical verification method for security protocols based on linear logic and BAN logic
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Pattern-based abstraction for verifying secrecy in protocols
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
Verifying the purchase request in SET protocol
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Using auxiliary sensors for pairwise key establishment in WSN
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Model checking propositional projection temporal logic based on SPIN
ICFEM'07 Proceedings of the formal engineering methods 9th international conference on Formal methods and software engineering
Protocol verification via rigid/flexible resolution
LPAR'07 Proceedings of the 14th international conference on Logic for programming, artificial intelligence and reasoning
How to do things with cryptographic protocols
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
A formal analysis for capturing replay attacks in cryptographic protocols
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Safely composing security protocols
FSTTCS'07 Proceedings of the 27th international conference on Foundations of software technology and theoretical computer science
A type-theoretic framework for formal reasoning with different logical foundations
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
Isabelle/HOL: a proof assistant for higher-order logic
Isabelle/HOL: a proof assistant for higher-order logic
A provable secure authentication protocol given forward secure session key
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Enhanced mutual authentication and key exchange protocol for wireless communications
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
Modeling and analysis of agent-based specifications of security protocols using CSANs and PDETool
IIT'09 Proceedings of the 6th international conference on Innovations in information technology
Cryptographic protocol verification using tractable classes of horn clauses
Program analysis and compilation, theory and practice
Efficient solutions of a PEPA model of a key distribution centre
Performance Evaluation
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Training signal design for discriminatory channel estimation
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Cooperative model reconstruction for cryptographic protocols using visual languages
CRIWG'09 Proceedings of the 15th international conference on Groupware: design, implementation, and use
Authentication tests based on test type matrix
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Model checking detectability of attacks in multiagent systems
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
An authentication model for delegation, attribution and least privilege
Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments
Parallel Model Checking for Temporal Epistemic Logic
Proceedings of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence
Developing security protocols by refinement
Proceedings of the 17th ACM conference on Computer and communications security
PEAR: a hardware based protocol authentication system
Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS
Degrees of security: protocol guarantees in the face of compromising adversaries
CSL'10/EACSL'10 Proceedings of the 24th international conference/19th annual conference on Computer science logic
On the power of non-spoofing adversaries
DISC'10 Proceedings of the 24th international conference on Distributed computing
Refinement types for secure implementations
ACM Transactions on Programming Languages and Systems (TOPLAS)
Computational soundness of symbolic zero-knowledge proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Finite models for formal security proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Training sequence design for discriminatory channel estimation in wireless MIMO systems
IEEE Transactions on Signal Processing
Three-party password-based authenticated key exchange protocol based on bilinear pairings
ICICA'10 Proceedings of the First international conference on Information computing and applications
Design and implementation of a public key-based group collaboration system
Computer Communications
Resiliency aspects of security protocols
Proceedings of the 15th international conference on Security protocols
A combination of forward and backward reachability analysis methods
ICFEM'10 Proceedings of the 12th international conference on Formal engineering methods and software engineering
Specification translation of state machines from equational theories into rewrite theories
ICFEM'10 Proceedings of the 12th international conference on Formal engineering methods and software engineering
Enforcing physically restricted access control for remote data
Proceedings of the first ACM conference on Data and application security and privacy
What do we mean by entity authentication?
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
An axiomatic basis of trust in distributed systems
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Requirements for security protocols
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Compositional verification with stutter-invariant propositional projection temporal logic
ICCOMP'10 Proceedings of the 14th WSEAS international conference on Computers: part of the 14th WSEAS CSCC multiconference - Volume I
Programming cryptographic protocols
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
A security scheme for dependable key insertion in mobile embedded devices
International Journal of Reconfigurable Computing - Special issue on selected papers from the international workshop on reconfigurable communication-centric systems on chips (ReCoSoC' 2010)
A team automaton scenario for the analysis of security properties of communication protocols
Journal of Automata, Languages and Combinatorics
Extended KCI attack against two-party key establishment protocols
Information Processing Letters
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Provably secure and efficient authentication techniques for the global mobility network
Journal of Systems and Software
Security'08 Proceedings of the 16th International conference on Security protocols
Analysis of authentication protocols with Scyter: case study
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
Cryptographic verification by typing for a sample protocol implementation
Foundations of security analysis and design VI
Multi-factor authenticated key exchange protocol in the three-party setting
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Honoring Carolyn Talcott's contributions to science
Formal modeling
Client v. server side protocols, interfaces and storage
Proceedings of the 11th international conference on Security Protocols
Is the verification problem for cryptographic protocols solved?
Proceedings of the 11th international conference on Security Protocols
Deniable authenticated key establishment for internet protocols
Proceedings of the 11th international conference on Security Protocols
Protocols for supporting a public key infrastructure in ad hoc networks
Proceedings of the 11th international conference on Security Protocols
From security protocols to systems security
Proceedings of the 11th international conference on Security Protocols
Location verification based defense against sybil attack in sensor networks
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
Deciding key cycles for security protocols
LPAR'06 Proceedings of the 13th international conference on Logic for Programming, Artificial Intelligence, and Reasoning
Message confidentiality testing of security protocols: passive monitoring and active checking
TestCom'06 Proceedings of the 18th IFIP TC6/WG6.1 international conference on Testing of Communicating Systems
Game semantics model for security protocols
ICFEM'05 Proceedings of the 7th international conference on Formal Methods and Software Engineering
A token-based single sign-on protocol
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Analyzing security protocols using association rule mining
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
Induction-guided falsification
ICFEM'06 Proceedings of the 8th international conference on Formal Methods and Software Engineering
Interactive diffie-hellman assumptions with applications to password-based authentication
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
An improved lu-cao's remote user authentication scheme using smart card
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
New authentication scheme based on a one-way hash function and diffie-hellman key exchange
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Specifying authentication using signal events in CSP
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
SeVe: automatic tool for verification of security protocols
Frontiers of Computer Science in China
A new mobile payment system with formal verification
International Journal of Internet Technology and Secured Transactions
Comparison of cryptographic verification tools dealing with algebraic properties
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Cryptographic protocol analysis on real c code
VMCAI'05 Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation
Password-Based authenticated key exchange in the three-party setting
PKC'05 Proceedings of the 8th international conference on Theory and Practice in Public Key Cryptography
Verified Cryptographic Implementations for TLS
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
TACAS'05 Proceedings of the 11th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Protocol analysis for concrete environments
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
Preventing delegation-based mobile authentications from man-in-the-middle attacks
Computer Standards & Interfaces
Secure communications over insecure channels based on short authenticated strings
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Formal verification of a type flaw attack on a security protocol using object-z
ZB'05 Proceedings of the 4th international conference on Formal Specification and Development in Z and B
Operational semantics of security protocols
SMTT'03 Proceedings of the 2003 international conference on Scenarios: models, Transformations and Tools
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
A generic model for analyzing security protocols
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Browser model for security analysis of browser-based protocols
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Design of secure key establishment protocols: successes, failures and prospects
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Verified reference implementations of WS-Security protocols
WS-FM'06 Proceedings of the Third international conference on Web Services and Formal Methods
Proof-Based design of security protocols
CSR'10 Proceedings of the 5th international conference on Computer Science: theory and Applications
“Fair” authentication in pervasive computing
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Security protocols verification in abductive logic programming: a case study
ESAW'05 Proceedings of the 6th international conference on Engineering Societies in the Agents World
BGN authentication and its extension to convey message commitments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Cryptographic protocols analysis in event b
PSI'09 Proceedings of the 7th international Andrei Ershov Memorial conference on Perspectives of Systems Informatics
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
On broadcast encryption with random key pre-distribution schemes
ICISS'05 Proceedings of the First international conference on Information Systems Security
On the formal analyses of the zhou-gollmann non-repudiation protocol
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Secure untrusted binaries — provably!
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Integrating trust management and access control in data-intensive Web applications
ACM Transactions on the Web (TWEB)
A novel common control channel security framework for cognitive radio networks
International Journal of Autonomous and Adaptive Communications Systems
A privacy-restoring mechanism for offline RFID systems
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Security goals and protocol transformations
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Structured Communication-Centered Programming for Web Services
ACM Transactions on Programming Languages and Systems (TOPLAS)
Tutorial: Security in computer networks and distributed systems
Computer Communications
Research: Secure and minimal protocols for authenticated key distribution
Computer Communications
Secure end-to-end delegations in distributed systems
Computer Communications
Research note: Group-oriented authentication mechanism with key exchange
Computer Communications
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Tutorial: Efficient and secure password-based authentication protocols against guessing attacks
Computer Communications
Fine-Grained Access Control in the Chirp Distributed File System
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Insider attacks and privacy of RFID protocols
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Formal passive testing of timed systems: theory and tools
Software Testing, Verification & Reliability
Is cryptyc able to detect insider attacks?
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
A belief logic for analyzing security of web protocols
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Timed traces and strand spaces
CSR'07 Proceedings of the Second international conference on Computer Science: theory and applications
Security evaluation of scenarios based on the TCG's TPM specification
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Incremental development of large, secure smart card applications
Proceedings of the Workshop on Model-Driven Security
Stayin' alive: aliveness as an alternative to authentication
SP'12 Proceedings of the 20th international conference on Security Protocols
Sessions and separability in security protocols
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
On the security of an authenticated group key transfer protocol based on secret sharing
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
PHAP: Password based Hardware Authentication using PUFs
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
An updated threat model for security ceremonies
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Distributing trusted third parties
ACM SIGACT News
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
Proceedings of the 2013 ACM workshop on Digital identity management
Authenticated key agreement in wireless networks with automated key management
Proceedings of the 6th International Conference on Security of Information and Networks
Establishing and preserving protocol security goals
Journal of Computer Security - Foundational Aspects of Security
Hi-index | 48.34 |
Use of encryption to achieve authenticated communication in computer networks is discussed. Example protocols are presented for the establishment of authenticated connections, for the management of authenticated mail, and for signature verification and document integrity guarantee. Both conventional and public-key encryption algorithms are considered as the basis for protocols.