next up previous
Up: A New Algorithm for Previous: Conclusion

References

1
M. Abadi and Marc. R. Tuttle.
A Semantics for a Logic of Authentication.
In Proceedings of the 10th Annual ACM Symposium On Principles of Distributed Computing, pages 201-216, August 1991.

2
Martin Abadi and Andrew D. Gordon.
A Calculus for Cryptographic Protocols: The Spi Calculus.
Technical report, DEC/SRC, December 1996.

3
Martin Abadi and Andrew D. Gordon.
A Calculus for Cryptographic Protocols: The Spi Calculus.
In the Proceedings of the Fourth ACM Conference on Computer and Communications Security. ACM Press, April 1997.

4
Martin Abadi and Roger Needham.
Prudent Engineering Practice for Cryptographic Protocols.
Technical report, SRC DIGITAL, June 1994.

5
P. Bieber.
A Logic of Communication in a Hostile Environment.
In Proceedings of the Computer Security Foundations Workshop III, pages 14-22. IEEE Computer Society Press, 1990.

6
Pierre Bieber and Nora Boulahia Cuppens.
Formal Development of Authentication Protocols.
In Proceedings of the BCS-FACS 6th Refinemment Workshop on software Engineering and its Applications, January 1994.

7
Pierre Bieber, Nora Boulahia Cuppens, Thomas Lehman, and Erich van Wickeren.
Abstract Machines for Communication Security.
In the Proceedings of the IEEE Computer Security Foundation Workshop VI, June 1993.

8
Dominique Bolignano.
An Approach to the Formal Verification of Cryptographic Protocols.
In the Proceedings of the Third ACM Conference on Computer and Communications Security, CCS'96, New Delhi, India, pages 106-118. ACM Press, 1996.

9
Colin Boyd.
Security Archituctures Using Formal Methods.
Journal on Selected Areas in Communications, 11(5):694-701, June 1990.

10
Colin Boyd.
A Framework for Authentication.
In Proceedings of the European Symposuim on Research in Computer Security, ESORICS 92, volume 648 of Lecture Notes in Computer Science, pages 273-292. Springer Verlag, November 1992.

11
M. Burrows, M. Abadi, and R. Needham.
A Logic of Authentication.
In Proceedings of the Royal Society of London, volume 426, pages 233-271, 1989.

12
Michael Burrows, Martin Abadi, and Roger M. Needham.
Rejoinder to Nessett.
ACM Operating Systems Review, 24(2):39-40, April 1990.

13
U. Carlsen.
Formal Specification and Analysis of Cryptographic Protocols.
PhD thesis, Thèse d'Informatique soutenue à l'Université PARIS XI, October 1994.

14
John Clark and Jeremy Jacob.
A Survey of Authentication Protocol Literature.
Unpublished article available at http://www.cs.york.ac.uk/~jeremy.

15
K. Gaarder and E. Snekkenes.
Applying a formal analysis technique to the CCITT X.509 Strong Two-Way Authentication Protocol.
Journal of cryptology, 3(2), pages 81-98, 1991.

16
Paul Gardiner, Dave Jackson, Jason Hulance, and Bill Roscoe.
Security Modelling in CSP and FDR: Deliverable Bundle 2.
Technical report, Formal Systems (Europe) Ltd, April 1996.

17
Paul Gardiner, Dave Jackson, and Bill Roscoe.
Security Modelling in CSP and FDR: Deliverable Bundle 3.
Technical report, Formal Systems (Europe) Ltd, July 1996.

18
Janice I. Glasgow, Glenn H. MacEwen, and Prakash Panangaden.
A Logic for Reasoning About Security.
ACM Transactions on Computer Systems, 10(3):226-264, August 1992.

19
V.D. Gligor and R. Kailar.
On Belief Evolution in Authentication Protcols.
In Proceedings of the IEEE Computer Security Foundations Workshop IV, Franconia, pages 103-116, June 1991.

20
Li Gong, Roger Needham, and Raphael Yahalom.
Reasoning About Belief in Cryptographic Protocols.
In Deborah Cooper and Teresa Lunt, editors, Proceedings 1990 IEEE Symposium on Research in Security and Privacy, pages 234-248. IEEE Computer Society, May 1990.

21
C. A. R. Hoare.
Communating Sequential Processes.
Prentice Hall, 1985.

22
R. A. Kemmerer.
Using Formal Verification Techniques to Analyse Encryption Protocols.
In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 134-139. IEEE Computer Society Press, 1987.

23
R. A. Kemmerer.
Analysing Encryption Protocols Using Formal Verification Techniques.
IEEE Journal on Selected Areas in Communications, 7(4):448-457, 1989.

24
Armin Liebl.
Authentication in Distributed Systems: A Bibliography.
Operating Systems Review, 27(4):122-136, October 1993.

25
Gavin Lowe.
An Attack on the Needham-Schroeder Public Key Authentication Protocol.
Information Processing Letters, 56(3):131-136, November 1995.

26
Gavin Lowe.
Breaking and Fixing the Needham Schroeder Public-Key Protocol using FDR.
In Proceedings of TACAS, volume 1055, pages 147-166. Springer Verlag, 1996.

27
Gavin Lowe.
Some new attacks upon security protocols.
In Proceedings of the Computer Security Foundations Workshop VIII. IEEE Computer Society Pres, 1996.

28
Gavin Lowe.
SPLICE-AS: A Case Study in Using CSP to Detect Errors in Security Protocols.
Technical report, Programming Research Group, Oxford, 1996.

29
Wenbo Mao and Colin Boyd.
Towards the Formal Analysis of Security Protocols.
In Proceedings of the Computer Security Foundations Workshop VI, pages 147-158. IEEE Computer Society Press, 1993.

30
Catherine Meadows.
The NRL Protocol Analyser: An Overview.
Journal of Logic Programming, 1994.

31
Catherine Meadows.
Formal Verification of Cryptographic Protocols: A Survey.
In Proceedings of Asiacrypt 96, 1996.

32
R. Milner.
The Polyadic $\pi$-Calculus: A Tutorial.
Technical report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, 1991.

33
R. Milner, J. Parrow, and D. Walker.
A Calculus of Mobile Processes.
Technical report, Laboratory for Foundations of Computer Science, Department of Computer Science, University of Edinburgh, 1989.

34
R. Milner, J. Parrow, and D. Walker.
A calculus of mobile processes (Parts I and II).
Information and Computation, 100:1-77, 1992.

35
Louise E. Moser.
A Logic of Knowledge and Belief about Computer Security.
In J. Thomas Haigh, editor, Proceedings of the Computer Security Foundations Workshop III, pages 57-63. IEEE, Computer Society Press of the IEEE, 1989.

36
C. Meadows R. Kemmerer and Jonathan Millen.
Three Systems for Cryptographic Protocol Analysis.
Journal of Cryptology, 7(2):79-130, 1994.

37
P. V. Rangan.
An Axomiatic Basis of Trust in Distributed Systems.
In Proceedings of the 1988 Symposium on Security and Privacy, pages 204-211. IEEE Computer Society Press, April 1988.

38
Bill Roscoe and Paul Gardiner.
Security Modelling in CSP and FDR: Final Report.
Technical report, Formal Systems Europe, October 1995.

39
A.D. Rubin and P. Honeyman.
Formal Methods for the Analysis of Authentication Protocols.
Technical Report Technical report 93-7, Technical Report, Center for Information Technology Integration, 1993.
University of Michigan. Internal Draft.

40
Steve Schneider.
Security Properties and CSP.
In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 174-187. IEEE Computer Society Press, May 1996.

41
Einar Snekkenes.
Authentiction in Open Systems.
In 10th IFIP WG 6.1 Symposium on Protocol Specification, Testing and Verification, pages 313-324, June 1990.

42
Einar Snekkenes.
Formal Specification and Analysis of Cryptographic Protocols.
PhD thesis, Faculty of Mathematics and Natural Sciences, University of Oslo, Norwegian Defence Research Establishment, P.O. Box 25, N-2007, Kjeller, Norway, January 1995.

43
Paul Syverson.
The Use of Logic in the Analysis of Cryptographic Protocols.
In Teresa F. Lunt and John McLean, editors, Proceedings of the 1991 IEEE Symposium on Security and Privacy, pages 156-170. IEEE Computer Society, May 1991.

44
Paul Syverson.
Knowledge, Belief, and Semantics in the Analysis of Cryptographic Protocols.
Journal of Computer Security, 1(3):317-334, 92.

45
Paul Syverson and Paul C. van Oorshot.
On Unifying some Cryptographic Protocol Logics.
In Proceedings of the IEEE 1994 Computer Society Symposium on Security and Privacy, pages 14-28. IEEE Computer Society, May 1994.

46
The commission of the European Communities CEC DG-XIII.
Security Investigation Final Report.
Technical Report S2011/7000/D010 7000 1000, CEC, September 1993.

47
Vijay Varadharajan.
Formal specification of a secure distributed system.
In Proceedings of the 12th National Computer Security Conference, pages 146-171, October 1989.

48
Vijay Varadharajan.
Verification of network security protocols.
Computers and Security, 8, December 1989.

49
Vijay Varadharajan.
Use of Formal Technique in the Specification of Authentication protocols.
Computer Standards and Interfaces, 9:203-215, 1990.

50
T. Y. C. Woo and S. S. Lam.
Authentication for Distributed Systems.
Computer, 25(1):39-52, January 1992.

51
T. Y. C. Woo and S. S. Lam.
A Lesson on Authentication Protocol Design.
Operating Systems Review, pages 24-37, 1994.