Information Technology Reference
In-Depth Information
8. Cervesato, I., Durgin, N.A., Lincoln, P.D., Mitchell, J.C., and Scedrov, A.: Relating
strands and multiset rewriting for security protocol analysis. In Proc. of the 13th
IEEE Computer Security Foundations Workshop (CSFW '00) . IEEE (2000) 35-51
9. Clarke, E.M., Jha, S., and Marrero, W.: A Machine Checkable Logic of Knowledge
for Protocols. In Proc. of Workshop on Formal Methods and Security Protocols ,
(1998)
10. Crazzolara, F. and Winskel, G.: Events in security protocols. In Proceedings of
the 8th ACM conference on Computer and Communications Security . ACM Press
(2001) 96-105
11. Denker, G. and Millen, J.: Capsl integrated protocol environment. In Proc. of
DARPA Information Survivability Conference (DISCEX 2000), IEEE Computer
Society, 2000 (2000) 207-221
12. Denker, G., Millen, J.K., Grau, A., and Filipe, J.K.: Optimizing protocol rewrite
rules of CIL specifications. In CSFW (2000) 52-62
13. D. Dolev and A. Yao. On the security of public-key protocols. IEEE Transaction
on Information Theory , 29(2) (1983) 198-208
14. Fiore, M. and Abadi, M.: Computing Symbolic Models for Verifying Cryptographic
Protocols. In Proc. of the 14th Computer Security Foundation Workshop (CSFW-
14) . IEEE, Computer Society Press (2001) 160-173
15. Focardi, R. and Gorrieri, R.: The Compositional Security Checker: A tool for the
Verification of Information Flow Security Properties. IEEE Transactions on Soft-
ware Engineering , 23(9) (1997) 550-571
16. Focardi, R., Gorrieri, R., and Martinelli, F.: NonInterference for the Analysis of
Cryyptographic Protocols. In Proc. of the ICALP'00 . Springer-Verlag (2000)
17. Focardi, R. and Martinelli, F.: A Uniform Approch for the Definition of Security
Properties. In Proc. of Congress on Formal Methods (FM'99) , volume 1708 of
Lecture Notes in Computer Science . Springer-Verlag (1999) 794-813
18. Gordon, A.D. and Jeffrey, A.: Authenticity by Typing for Security Protocols. In
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW 2001) . IEEE
Computer Society (2001) 145-159
19. Meadows, C.A.: The NRL protocol analyzer: an overview. In Proc. of the 2nd
International Conference on the Practical Application of PROLOG (1994)
20. Miller, D.: Higher-order quantification and proof search. In Proceedings of the
AMAST confrerence , LNCS. Springer (2002)
21. Milner, R.: Communication and Concurrency . International Series in Computer
Science. Prentice Hall (1989)
22. Milner, R.: Communicating and Mobile Systems: the π-Calculus . Cambridge Uni-
versity Press (2000)
23. Milner, R., Parrow, J., and Walker, D.: A Calculus of Mobile Processes, I and II.
Information and Computation , 100(1) (1992) 1-40
24. S. Schneider. Security properties and CSP. In Proc. of the IEEE Symposium on
Research in Security and Privacy (1996) 174-187
25. Schneider, S.: Verifying Authentication Protocols in CSP. IEEE Transaction on
Sofware Engineering , 24(8) (1998) 743-758
26. Thayer, J., Herzog, J., and Guttman, J.: Honest ideals on strand spaces. In Proc.
of the 11th IEEE Computer Security Foundations Workshop (CSFW '98) , Wash-
ington - Brussels - Tokyo. IEEE (1998) 66-78
27. Thayer, J., Herzog, J., and Guttman, J.: Strand spaces: Why is a security protocol
correct? In Proc. of the 19th IEEE Computer Society Symposium on Research in
Security and Privacy (1998)
Search WWH ::




Custom Search