The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
A method for examining cryptographic protocols
A method for examining cryptographic protocols
Casper: a compiler for the analysis of security protocols
Journal of Computer Security
Identification of host audit data to detect attacks on low-level IP vulnerabilities
Journal of Computer Security
NetSTAT: a network-based intrusion detection system
Journal of Computer Security
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Practical Intrusion Detection Handbook
Practical Intrusion Detection Handbook
The Theory and Practice of Concurrency
The Theory and Practice of Concurrency
A Framework for a Cryptographic Protocol Evaluation Workbench
HASE '99 The 4th IEEE International Symposium on High-Assurance Systems Engineering
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Authentication: A Practical Study in Belief and Action
Proceedings of the 2nd Conference on Theoretical Aspects of Reasoning about Knowledge
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Protocol Interactions and the Chosen Protocol Attack
Proceedings of the 5th International Workshop on Security Protocols
Proving Security Protocols Correct
LICS '99 Proceedings of the 14th Annual IEEE Symposium on Logic in Computer Science
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
On the security of public key protocols
On the security of public key protocols
Evaluating Cryptographic Protocols
Evaluating Cryptographic Protocols
A formal semantics for evaluating cryptographic protocols
A formal semantics for evaluating cryptographic protocols
Research note: Security issues related to mobile code and agent-based systems
Computer Communications
An environment for security protocol intrusion detection
Journal of Computer Security
Hi-index | 0.00 |