On the properties of cryptographic protocols and the weaknesses of the BAN-like logics
ACM SIGOPS Operating Systems Review
Extending NCP for protocols using public keys
Mobile Networks and Applications - Special issue: protocols for mobile environments
Multicast security and its extension to a mobile environment
Wireless Networks
Using smartcards to secure a personalized gambling device
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Paradigm shifts in protocol analysis
Proceedings of the 1999 workshop on New security paradigms
A paradigmatic analysis of conventional approaches for developing and managing secure IS
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
A logic for modeling the dynamics of beliefs in cryptographic protocols
ACSC '01 Proceedings of the 24th Australasian conference on Computer science
An environment for security protocol intrusion detection
Journal of Computer Security
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Classification of Authentication Protocols: A Practical Approach
ISW '00 Proceedings of the Third International Workshop on Information Security
Security Protocol Design via Authentication Tests
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Extending NCP for protocols using public keys
ICCCN '95 Proceedings of the 4th International Conference on Computer Communications and Networks
Metadata for Anomaly-Based Security Protocol Attack Deduction
IEEE Transactions on Knowledge and Data Engineering
Fast automatic synthesis of security protocols using backward search
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Specification and formal verification of security requirements
CompSysTech '04 Proceedings of the 5th international conference on Computer systems and technologies
A collaborative approach to autonomic security protocols
NSPW '04 Proceedings of the 2004 workshop on New security paradigms
Efficient network authentication protocols: lower bounds and optimal implementations
Distributed Computing
Building blocks for atomicity in electronic commerce
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Authentication tests and disjoint encryption: A design method for security protocols
Journal of Computer Security - Special issue on CSFW15
An Approach for the Design of Secure Communication in Embedded Systems
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
Performance Evaluation of Security Protocols Specified in LySa
Electronic Notes in Theoretical Computer Science (ENTCS)
AnBx: security protocols design and verification
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
What do we mean by entity authentication?
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Limitations on design principles for public key protocols
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Design of secure key establishment protocols: successes, failures and prospects
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Soundness of removing cancellation identities in protocol analysis under Exclusive-OR
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Fast automatic security protocol generation
Journal of Computer Security
Hi-index | 0.00 |
We give a formal model of protocol security. Our model allows us to reason about the security of protocols, and considers issues of beliefs of agents, time, and secrecy. We prove a composition theorem which allows us to state sufficient conditions on ...