The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Introduction to mathematical logic (3rd ed.)
Introduction to mathematical logic (3rd ed.)
Logics of time and computation
Logics of time and computation
The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Integrating security in a large distributed system
ACM Transactions on Computer Systems (TOCS)
SOSP '89 Proceedings of the twelfth ACM symposium on Operating systems principles
ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Authentication and authenticated key exchanges
Designs, Codes and Cryptography
A note on the use of timestamps as nonces
ACM SIGOPS Operating Systems Review
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
Adding time to a logic of authentication
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Extending cryptographic logics of belief to key agreement protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Reasoning about knowledge
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
A Model for Secure Protocols and Their Compositions
IEEE Transactions on Software Engineering
A Formal Language for Cryptographic Protocol Requirements
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
An authentication logic supporting synchronization, revocation, and recency
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
Authenticated group key agreement and friends
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A calculus for cryptographic protocols
Information and Computation
Strand spaces: proving security protocols correct
Journal of Computer Security
Timestamps in key distribution protocols
Communications of the ACM
Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A cost-based framework for analysis of denial of service in networks
Journal of Computer Security
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
Separating the Specification and Implementation Phases in Cryptology
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Formal Semantics for Authentication Logics
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Sound Logic for Analysing Electronic Commerce Protocols
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Analysing Time Dependent Security Properties in CSP Using PVS
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
Formal Verification of Cardholder Registration in SET
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
Open Issues in Formal Methods for Cryptographic Protocol Analysis
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Robustness Principles for Public Key Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Efficient Group Signature Schemes for Large Groups (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Reconciling Two Views of Cryptography (The Computational Soundness of Formal Encryption)
TCS '00 Proceedings of the International Conference IFIP on Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics
A Formal Specification of Requirements for Payment Transactions in the SET Protocol
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Group Principals and the Formalization of Anonymity
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
A HOL extension of GNY for automatically analyzing cryptographic protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Intensional specifications of security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
A Hierarchy of Authentication Specifications
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Mechanized proofs for a recursive authentication protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
A Simple Logic for Authentication Protocol Design
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Evaluating and Improving Protocol Analysis by Automatic Proof
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Honest Ideals on Strand Spaces
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
C3PO: A Tool for Automatic Sound Cryptographic Protocol Analysis
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
Roles in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Encrypted Key Exchange: Password-Based Protocols SecureAgainst Dictionary Attacks
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
A Logical Language for Specifying Cryptographic Protocol Requirements
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
On Unifying Some Cryptographic Protocol Logics
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Generating Formal Cryptographic Protocol Specifications
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Prudent Engineering Practice for Cryptographic Protocols
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Reasoning about accountability in protocols for electronic commerce
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Limitations on Design Principles for Public Key Protocols
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
What do we mean by entity authentication?
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Authentication: a practical study in belief and action
TARK '88 Proceedings of the 2nd conference on Theoretical aspects of reasoning about knowledge
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Environmental requirements for authentication protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Higher-Order Quantification and Proof Search
AMAST '02 Proceedings of the 9th International Conference on Algebraic Methodology and Software Technology
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
IEEE Transactions on Dependable and Secure Computing
Preservation of epistemic properties in security protocol implementations
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
A PK-SIM card based end-to-end security framework for SMS
Computer Standards & Interfaces
Belief change and cryptographic protocol verification
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Byzantine fault tolerant public key authentication in peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
A new efficient authentication protocol for mobile networks
Computer Standards & Interfaces
Semantics and logic for security protocols
Journal of Computer Security
Toward Reasoning about Security Protocols: A Semantic Approach
Electronic Notes in Theoretical Computer Science (ENTCS)
Synthesising Efficient and Effective Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Formal analysis and improvement of multi-party non-repudiation protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A logical verification method for security protocols based on linear logic and BAN logic
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Developing high-assurance secure systems with UML: a smartcard-based purchase protocol
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
Towards formal analysis of wireless LAN security with MIS protocol
International Journal of Ad Hoc and Ubiquitous Computing
Distributed temporal logic for the analysis of security protocol models
Theoretical Computer Science
Towards understanding pure publish/subscribe cryptographic protocols
Security'08 Proceedings of the 16th International conference on Security protocols
From security protocols to systems security
Proceedings of the 11th international conference on Security Protocols
Decidable extensions of hennessy-milner logic
FORTE'06 Proceedings of the 26th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
A new mobile payment system with formal verification
International Journal of Internet Technology and Secured Transactions
Key-exchange protocol using pre-agreed Session-ID
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
A formal analysis of fairness and non-repudiation in the RSA-CEGD protocol
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Journal of Computer and System Sciences
Secure and Optimized Mobile Based Merchant Payment Protocol using Signcryption
International Journal of Information Security and Privacy
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
A wide-adapted bantam protocol for roaming across wireless areas
Wireless Networks
Enhancing MISP with Fast Mobile IPv6 Security
Mobile Information Systems - Emerging Wireless and Mobile Technologies
Hi-index | 0.00 |