next up previous
Up: A Model Checker for Previous: Conclusion

References

1
M. Abadi and A. Gordon.
A calculus for cryptographic protocols the spi calculus.
In Proceedings of the Fourth ACM Conference on Computer and Communications Security, April 1997.
To appear.

2
M. Abadi and M. Tuttle.
A semantics for a logic of authentication.
In Proceedings of the 10th ACM Symposium on Principles of Distributed Computing, pages 201-216, August 1991.

3
M. Bellare and P. Rogaway.
Provably secure session key distribution-the three party case.
In Proceedings of the 27th Annual ACM Symposium on Theory of Computing, pages 57-66, 1995.

4
D. Bolignano.
An approach to the formal verification of cryptographic protocols.
In Proceedings of the 3rd ACM Conference on Computer and Communication Security, 1996.

5
T. Bolognesi and E. Brinksma.
Introduction to the iso specification language LOTOS.
Computer Networks and ISDN Systems, 14(1):25-59, 1987.

6
M. Burrows, M. Abadi, and R. Needham.
A logic of authentication.
Technical Report 39, DEC Systems Research Center, February 1989.

7
D. Craigen and M. Saaltink.
Using EVES to analyze authentication protocols.
Technical Report TR-96-5508-05, ORA Canada, 1996.

8
D. Dolev and A. Yao.
On the security of public key protocols.
IEEE Transactions on Information Theory, 29(2):198-208, March 1989.

9
H. Garavel.
An overview of the Eucalyptus toolbox.
In COST247 workshop, June 1996.

10
J. W. Gray and J. McLean.
Using temporal logic to specify and verify cryptographic protocols (progress report).
In Proceedings of the 8th IEEE Computer Security Workshop, 1995.

11
N. Heintze and J. Tygar.
A model for secure protocols and their compositions.
IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.

12
C. A. R. Hoare.
Communicating Sequential Processes.
Prentice Hall, 1985.

13
R. Kailar.
Accountability in electronic commerce protocols.
IEEE Transactions on Software Engineering, 22(5), May 1996.

14
D. Kindred and J. M. Wing.
Fast, automatic checking of security protocols.
In USENIX 2nd Workshop on Electronic Commerce, 1996.

15
S. Lacroix, J.-M. Boucqueau, J.-J. Quistater, and B. Macq.
Providing equitable conditional access by use of trusted third parties.
In European Conference on Multimedia Applications, Services, and Techniques - ECMAST96, pages 763-782, May 1996.

16
G. Lowe.
Breaking and fixing the Needham-Schroeder public-key protocol using FDR.
In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer-Verlag, 1996.

17
C. Meadows.
Applying formal methods to the analysis of a key management protocol.
Journal of Computer Security, 1:5-53, 1992.

18
C. Meadows.
The NRL protocol analyzer: An overview.
In Proceedings of the Second International Conference on the Practical Applications of Prolog, 1994.

19
R. Needham and M. Schroeder.
Using encryption for authentication in large networks of computers.
Communications of the ACM, 21(12):993-999, 1978.

20
D. Peled.
All from one, one for all, on model-checking using representatives.
In Proceedings of the Fifth International Conference on Computer Aided Verification, Lecture Notes in Computer Science, pages 409-423. Springer-Verlag, 1993.

21
V. Shoup and A. Rubin.
Session key distribution using smart cards.
In Proceedings of Eurocrypt, 1996.

22
P. Syverson and P. van Oorschot.
On unifying some cryptographic protocol logics.
In Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, May 1994.

23
T. Y. C. Woo and S. S. Lam.
A semantic model for authentication protocols.
In Proceedings of the IEEE Symposium on Research in Security and Privacy, 1993.

24
T. Y. C. Woo and S. S. Lam.
Verifying authentication protocols: Methodology and example.
In Proceedings of the International Conference on Network Protocols, 1993.