Verified Interoperable Implementations of Security Protocols
- 2 August 2006
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableThis publication has 24 references indexed in Scilit:
- Automated Verification of Selected Equivalences for Security ProtocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Verified Interoperable Implementations of Security ProtocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- An efficient cryptographic protocol verifier based on prolog rulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Logical relations for encryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Verification of cryptographic protocols: tagging enforces terminationTheoretical Computer Science, 2005
- Spi2Java: automatic cryptographic protocol Java code generation from SPI calculusPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A bisimulation for dynamic sealingPublished by Association for Computing Machinery (ACM) ,2004
- Efficient and timely mutual authenticationACM SIGOPS Operating Systems Review, 1987
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978