Next: About this document
Up: Verification using LOTOS
Previous: Acknowledgements
References
- AG97
- M. Abadi and A.D. Gordon:
``A Calculus for Cryptographic Protocols
The Spi Calculus'',
Proceedings of the 4th ACM Conference on
Computer and Communication Security, 1997.
- Bol96
- D. Bolignano:
``Formal Verification of Cryptographic
Protocols'',
Proceedings of the 3rd ACM Conference on
Computer and Communication Security, 1996.
- Bol97
- D. Bolignano:
``Towards a Mechanization of
Cryptographic Protocol Verification'',
Proceedings of CAV 97, LNCS 1254, Springer-Verlag, June 1997.
- BB87
- T. Bolognesi and E. Brinksma:
``Introduction to the ISO Specification
Language LOTOS'',
Computer Networks and ISDN Systems 14,
pp. 25-59, 1987.
- BFG91
- A. Bouajjani, J.-C. Fernandez, S. Graf,
C. Rodriguez and J. Sifakis:
``Safety for Branching Time Semantics'',
18th ICALP, Springer-Verlag, July 1991.
- BAN90
- M. Burrow, M. Abadi and R. Needham:
``A Logic of Authentication'',
ACM Transactions on Computer Systems, 8, 1990.
- EM85
- H. Ehrig and B. Mahr:
``Fundamentals of Algebraic Specification
1, Equations and Initial Semantics'',
In: W. Brauer, B. Rozenberg, A. Salomaa,
Eds, EATCS, Monographs on Theorical Computer
Science, Springer-Verlag, 1985.
- FGK96
- J.-C. Fernandez, H. Garavel, A. Kerbrat,
R. Mateescu, L. Mounier and M. Sighireanu:
``CAESAR/ALDEBARAN Development Package:
A Protocol Validation and Verification
Toolbox'',
Proceedings of the 8th Conference on
Computer-Aided Verification, R. Alur &
T. Henzinger Eds, August 1996.
- Gar96
- H. Garavel:
``An Overview of the Eucalyptus
Toolbox'',
Proceedings of COST247 workshop, June 1996.
- GL97
- F. Germeau, G. Leduc:
``A Computer Aided Design of a Secure
Registration Protocol'',
Proceedings of FORTE/PSTV 97, Chapman & Hall,
1997, to appear.
- GQ88
- L. Guillou, J.-J. Quisquater:
``A Practical Zero-knowledge Protocol
Fitted to Security Microprocessor Minimizing
both Transmission and Memory'',
Proceedings of Eurocrypt 88, Springer-Verlag
Eds, pp. 123-128, 1988.
- GBM96
- J. Guimaraes, J.-M. Boucqueau and B. Macq:
``OKAPI: a Kernel for Access Control to
Multimedia Services based on Trusted Third
Parties'',
Proceedings of ECMAST 96, pp. 783-798,
Louvain-la-Neuve, Belgium, May 1996.
- Hoa85
- C.A.R. Hoare:
``Communicating Sequential Processes'',
Prentice-Hall International, 1985.
- ISO89
- ISO/IEC. Information Processing Systems - Open
Systems Interconnection:
``LOTOS, a
Formal Description Technique Based on the
Temporal Ordering of Observational
Behaviour'',
IS 8807, February 1989.
- LBQ96
- S. Lacroix, J.-M. Boucqueau, J.-J. Quiquater
and B. Macq:
``Providing Equitable Conditional
Access by Use of Trusted Third Parties'',
Proceedings of ECMAST 96, pp. 763-782,
Louvain-la-Neuve, Belgium, May 1996.
- LBK96
- G. Leduc, O. Bonaventure, E. Koerner, L. Léonard, C. Pecheur,
D. Zanetti:
``Specification and Verification of a TTP Protocol for the
Conditional Access to Services.'',
Proceedings of 12th J. Cartier Workshop on Formal Methods and their
Applications : Telecommunications, VLSI and Real-Time Computerized
Control System, Montreal, Canada, October 1996.
- Low96
- G. Lowe:
``Breaking and Fixing the Needham-Schroeder Public-Key
Authentication Protocol using FDR'',
T. Margaria and B. Steffen Eds, Tools and Algorithms for the
Construction and Analysis of Systems, LNCS 1055, Springer-Verlag,
1996.
- Mea92
- C. Meadows:
``Applying Formal Methods to the Analysis
of a Key Management Protocol'',
Journal of Computer Security, 1992.
- Mil89
- R. Milner:
``Communication and Concurrency'',
Prentice-Hall International, 1989.
- Pec96
- C. Pecheur:
``Improving the Specification of Data
Types in LOTOS'',
Doctoral dissertation, University of Liège,
November 1996.
- Sch96
- B. Schneier:
``Applied Cryptography'',
Second Edition, John Wiley & Sons Eds, 1996.