145 lines
4.6 KiB
BibTeX
145 lines
4.6 KiB
BibTeX
@string{csfw97 = "Proc.\ 10th IEEE Computer Security Foundations Workshop (CSFW)" }
|
|
@string{csfw01 = "Proc.\ 14th IEEE Computer Security Foundations Workshop (CSFW)" }
|
|
@string{csfw03 = "Proc.\ 16th IEEE Computer Security Foundations Workshop (CSFW)" }
|
|
@string{csfw04 = "Proc.\ 17th IEEE Computer Security Foundations Workshop (CSFW)" }
|
|
@string{csfw06 = "Proc.\ 19th IEEE Computer Security Foundations Workshop (CSFW)" }
|
|
@string{ieeecoso = "IEEE Comp. Soc." }
|
|
@string{tocs = "ACM Transactions on Computer Systems" }
|
|
@string{sv = "Springer" }
|
|
@string{lncs = "LNCS" }
|
|
@string{entcs = "ENTCS" }
|
|
@string{els = "Elsevier" }
|
|
@string{jcs = "Journal of Computer Security" }
|
|
@string{tacas96 = "TACAS'96"}
|
|
|
|
@article{cmv2003blackbox,
|
|
author = {C.J.F. Cremers and S. Mauw and E.P. de Vink},
|
|
title = {Formal Methods for Security Protocols: Three
|
|
Examples of the Black-Box Approach},
|
|
journal = {NVTI newsletter},
|
|
year = 2003,
|
|
volume = {7},
|
|
pages = {21--32},
|
|
note = {Newsletter of the Dutch Association for Theoretical
|
|
Computing Scientists},
|
|
}
|
|
|
|
@InProceedings{CrMaVi03,
|
|
publisher = {IITT-CNR technical report},
|
|
title = {Defining authentication in a trace model},
|
|
booktitle = {Proc.\ FAST 2003},
|
|
author = {Cremers, C.J.F. and Mauw, S. and Vink, E.P. de},
|
|
editor = {T. Dimitrakos and F. Martinelli},
|
|
address = {Pisa},
|
|
year = {2003},
|
|
pages = {131--145}
|
|
}
|
|
|
|
@inproceedings{lowe96breaking,
|
|
author = "G. Lowe",
|
|
title = "Breaking and fixing the {N}eedham-{S}chroeder
|
|
public-key protocol using {FDR}",
|
|
booktitle = "Proc.\ TACAS '96",
|
|
editor = "T. Margaria and B. Steffen",
|
|
publisher = "LNCS~1055",
|
|
pages = "147--166",
|
|
year = "1996"
|
|
}
|
|
|
|
@inproceedings{athena,
|
|
author = {D. Song},
|
|
title = {Athena: a New Efficient Automatic Checker for Security
|
|
Protocol Analysis},
|
|
booktitle = {Proc.\ CSFW '99, Mordano},
|
|
year = {1999},
|
|
pages = {192},
|
|
publisher = {IEEE},
|
|
}
|
|
|
|
@inproceedings{CrMa04b,
|
|
author = {C.J.F. Cremers and S. Mauw},
|
|
title = {Operational Semantics of Security Protocols},
|
|
booktitle = "Scenarios: Models, Transformations and Tools, International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers",
|
|
year = 2005,
|
|
series = "LNCS",
|
|
editor = "S. Leue and T. Syst{\"a}",
|
|
volume = "3466",
|
|
publisher = "Springer",
|
|
url =
|
|
"http://www.win.tue.nl/~ecss/downloads/CrMa04b.pdf"
|
|
}
|
|
|
|
@inproceedings{cm04sam,
|
|
author = "C.J.F. Cremers and S. Mauw",
|
|
title = "Checking secrecy by means of partial order reduction",
|
|
booktitle = "Proc.\ SAM 2004",
|
|
volume = {LNCS 3319},
|
|
publisher = {Springer},
|
|
year = 2004,
|
|
editor = "D. Amyot and A.W. Williams",
|
|
pages = {177--194}
|
|
}
|
|
|
|
@Misc{wwwscyther,
|
|
Author = "C.J.F. Cremers",
|
|
Title = "The Scyther tool: Automated verification of security protocols",
|
|
Note = {\url{http://people.inf.ethz.ch/cremersc/scyther/index.html}}
|
|
}
|
|
|
|
@phdthesis{scytherthesis,
|
|
Author = {C.J.F. Cremers},
|
|
Title = {Scyther - Semantics and Verification of Security Protocols},
|
|
School = {Eindhoven University of Technology},
|
|
Publisher = {University Press Eindhoven},
|
|
Year = {2006},
|
|
type = {{Ph.D.} dissertation}
|
|
}
|
|
|
|
@InProceedings{lowe97hierarchy,
|
|
Author = "G. Lowe",
|
|
Title = "A Hierarchy of Authentication Specifications",
|
|
BookTitle = csfw97,
|
|
Pages = "31--44",
|
|
Publisher = {IEEE},
|
|
year = 1997
|
|
}
|
|
|
|
@book{opsembook,
|
|
Author = {Cas Cremers and Sjouke Mauw},
|
|
Title = {Operational Semantics and Verification of Security
|
|
Protocols},
|
|
Year = {2012},
|
|
Publisher = {Springer},
|
|
Series = {Information Security and Cryptography},
|
|
}
|
|
|
|
@InProceedings{Cr2006multiprotocol,
|
|
Author = {C.J.F. Cremers},
|
|
Title = {Feasibility of Multi-Protocol Attacks},
|
|
BookTitle = {Proc.\ of The First International Conference on
|
|
Availability, Reliability and Security ({ARES})},
|
|
Address = "Vienna, Austria",
|
|
Publisher = "IEEE Computer Society",
|
|
month = "April",
|
|
pages = "287--294",
|
|
year = 2006
|
|
}
|
|
|
|
@InProceedings{kelsey97protocol,
|
|
author = {J. Kelsey and
|
|
B. Schneier and
|
|
D. Wagner},
|
|
title = {Protocol Interactions and the Chosen Protocol Attack},
|
|
booktitle = {Fifth International Workshop on Security Protocols},
|
|
year = {1997},
|
|
pages = {91--104},
|
|
editor = {B. Christianson and
|
|
B. Crispo and
|
|
T.M.A. Lomas and
|
|
M. Roe},
|
|
publisher = sv,
|
|
series = lncs,
|
|
volume = {1361},
|
|
}
|
|
|