next up previous
Next: About this document Up: Verification using LOTOS Previous: Acknowledgements


M. Abadi and A.D. Gordon: ``A Calculus for Cryptographic Protocols The Spi Calculus'', Proceedings of the 4th ACM Conference on Computer and Communication Security, 1997.
D. Bolignano: ``Formal Verification of Cryptographic Protocols'', Proceedings of the 3rd ACM Conference on Computer and Communication Security, 1996.
D. Bolignano: ``Towards a Mechanization of Cryptographic Protocol Verification'', Proceedings of CAV 97, LNCS 1254, Springer-Verlag, June 1997.
T. Bolognesi and E. Brinksma: ``Introduction to the ISO Specification Language LOTOS'', Computer Networks and ISDN Systems 14, pp. 25-59, 1987.
A. Bouajjani, J.-C. Fernandez, S. Graf, C. Rodriguez and J. Sifakis: ``Safety for Branching Time Semantics'', 18th ICALP, Springer-Verlag, July 1991.
M. Burrow, M. Abadi and R. Needham: ``A Logic of Authentication'', ACM Transactions on Computer Systems, 8, 1990.
H. Ehrig and B. Mahr: ``Fundamentals of Algebraic Specification 1, Equations and Initial Semantics'', In: W. Brauer, B. Rozenberg, A. Salomaa, Eds, EATCS, Monographs on Theorical Computer Science, Springer-Verlag, 1985.
J.-C. Fernandez, H. Garavel, A. Kerbrat, R. Mateescu, L. Mounier and M. Sighireanu: ``CAESAR/ALDEBARAN Development Package: A Protocol Validation and Verification Toolbox'', Proceedings of the 8th Conference on Computer-Aided Verification, R. Alur & T. Henzinger Eds, August 1996.
H. Garavel: ``An Overview of the Eucalyptus Toolbox'', Proceedings of COST247 workshop, June 1996.
F. Germeau, G. Leduc: ``A Computer Aided Design of a Secure Registration Protocol'', Proceedings of FORTE/PSTV 97, Chapman & Hall, 1997, to appear.
L. Guillou, J.-J. Quisquater: ``A Practical Zero-knowledge Protocol Fitted to Security Microprocessor Minimizing both Transmission and Memory'', Proceedings of Eurocrypt 88, Springer-Verlag Eds, pp. 123-128, 1988.
J. Guimaraes, J.-M. Boucqueau and B. Macq: ``OKAPI: a Kernel for Access Control to Multimedia Services based on Trusted Third Parties'', Proceedings of ECMAST 96, pp. 783-798, Louvain-la-Neuve, Belgium, May 1996.
C.A.R. Hoare: ``Communicating Sequential Processes'', Prentice-Hall International, 1985.
ISO/IEC. Information Processing Systems - Open Systems Interconnection: ``LOTOS, a Formal Description Technique Based on the Temporal Ordering of Observational Behaviour'', IS 8807, February 1989.
S. Lacroix, J.-M. Boucqueau, J.-J. Quiquater and B. Macq: ``Providing Equitable Conditional Access by Use of Trusted Third Parties'', Proceedings of ECMAST 96, pp. 763-782, Louvain-la-Neuve, Belgium, May 1996.
G. Leduc, O. Bonaventure, E. Koerner, L. Léonard, C. Pecheur, D. Zanetti: ``Specification and Verification of a TTP Protocol for the Conditional Access to Services.'', Proceedings of 12th J. Cartier Workshop on Formal Methods and their Applications : Telecommunications, VLSI and Real-Time Computerized Control System, Montreal, Canada, October 1996.
G. Lowe: ``Breaking and Fixing the Needham-Schroeder Public-Key Authentication Protocol using FDR'', T. Margaria and B. Steffen Eds, Tools and Algorithms for the Construction and Analysis of Systems, LNCS 1055, Springer-Verlag, 1996.
C. Meadows: ``Applying Formal Methods to the Analysis of a Key Management Protocol'', Journal of Computer Security, 1992.
R. Milner: ``Communication and Concurrency'', Prentice-Hall International, 1989.
C. Pecheur: ``Improving the Specification of Data Types in LOTOS'', Doctoral dissertation, University of Liège, November 1996.
B. Schneier: ``Applied Cryptography'', Second Edition, John Wiley & Sons Eds, 1996.