Added bare old copy of manual source files.
This commit is contained in:
144
manual/biblio.bib
Normal file
144
manual/biblio.bib
Normal file
@@ -0,0 +1,144 @@
|
||||
@string{csfw97 = "Proc.\ 10th IEEE Computer Security Foundations Workshop (CSFW)" }
|
||||
@string{csfw01 = "Proc.\ 14th IEEE Computer Security Foundations Workshop (CSFW)" }
|
||||
@string{csfw03 = "Proc.\ 16th IEEE Computer Security Foundations Workshop (CSFW)" }
|
||||
@string{csfw04 = "Proc.\ 17th IEEE Computer Security Foundations Workshop (CSFW)" }
|
||||
@string{csfw06 = "Proc.\ 19th IEEE Computer Security Foundations Workshop (CSFW)" }
|
||||
@string{ieeecoso = "IEEE Comp. Soc." }
|
||||
@string{tocs = "ACM Transactions on Computer Systems" }
|
||||
@string{sv = "Springer" }
|
||||
@string{lncs = "LNCS" }
|
||||
@string{entcs = "ENTCS" }
|
||||
@string{els = "Elsevier" }
|
||||
@string{jcs = "Journal of Computer Security" }
|
||||
@string{tacas96 = "TACAS'96"}
|
||||
|
||||
@article{cmv2003blackbox,
|
||||
author = {C.J.F. Cremers and S. Mauw and E.P. de Vink},
|
||||
title = {Formal Methods for Security Protocols: Three
|
||||
Examples of the Black-Box Approach},
|
||||
journal = {NVTI newsletter},
|
||||
year = 2003,
|
||||
volume = {7},
|
||||
pages = {21--32},
|
||||
note = {Newsletter of the Dutch Association for Theoretical
|
||||
Computing Scientists},
|
||||
}
|
||||
|
||||
@InProceedings{CrMaVi03,
|
||||
publisher = {IITT-CNR technical report},
|
||||
title = {Defining authentication in a trace model},
|
||||
booktitle = {Proc.\ FAST 2003},
|
||||
author = {Cremers, C.J.F. and Mauw, S. and Vink, E.P. de},
|
||||
editor = {T. Dimitrakos and F. Martinelli},
|
||||
address = {Pisa},
|
||||
year = {2003},
|
||||
pages = {131--145}
|
||||
}
|
||||
|
||||
@inproceedings{lowe96breaking,
|
||||
author = "G. Lowe",
|
||||
title = "Breaking and fixing the {N}eedham-{S}chroeder
|
||||
public-key protocol using {FDR}",
|
||||
booktitle = "Proc.\ TACAS '96",
|
||||
editor = "T. Margaria and B. Steffen",
|
||||
publisher = "LNCS~1055",
|
||||
pages = "147--166",
|
||||
year = "1996"
|
||||
}
|
||||
|
||||
@inproceedings{athena,
|
||||
author = {D. Song},
|
||||
title = {Athena: a New Efficient Automatic Checker for Security
|
||||
Protocol Analysis},
|
||||
booktitle = {Proc.\ CSFW '99, Mordano},
|
||||
year = {1999},
|
||||
pages = {192},
|
||||
publisher = {IEEE},
|
||||
}
|
||||
|
||||
@inproceedings{CrMa04b,
|
||||
author = {C.J.F. Cremers and S. Mauw},
|
||||
title = {Operational Semantics of Security Protocols},
|
||||
booktitle = "Scenarios: Models, Transformations and Tools, International Workshop, Dagstuhl Castle, Germany, September 7-12, 2003, Revised Selected Papers",
|
||||
year = 2005,
|
||||
series = "LNCS",
|
||||
editor = "S. Leue and T. Syst{\"a}",
|
||||
volume = "3466",
|
||||
publisher = "Springer",
|
||||
url =
|
||||
"http://www.win.tue.nl/~ecss/downloads/CrMa04b.pdf"
|
||||
}
|
||||
|
||||
@inproceedings{cm04sam,
|
||||
author = "C.J.F. Cremers and S. Mauw",
|
||||
title = "Checking secrecy by means of partial order reduction",
|
||||
booktitle = "Proc.\ SAM 2004",
|
||||
volume = {LNCS 3319},
|
||||
publisher = {Springer},
|
||||
year = 2004,
|
||||
editor = "D. Amyot and A.W. Williams",
|
||||
pages = {177--194}
|
||||
}
|
||||
|
||||
@Misc{wwwscyther,
|
||||
Author = "C.J.F. Cremers",
|
||||
Title = "The Scyther tool: Automated verification of security protocols",
|
||||
Note = {\url{http://people.inf.ethz.ch/cremersc/scyther/index.html}}
|
||||
}
|
||||
|
||||
@phdthesis{scytherthesis,
|
||||
Author = {C.J.F. Cremers},
|
||||
Title = {Scyther - Semantics and Verification of Security Protocols},
|
||||
School = {Eindhoven University of Technology},
|
||||
Publisher = {University Press Eindhoven},
|
||||
Year = {2006},
|
||||
type = {{Ph.D.} dissertation}
|
||||
}
|
||||
|
||||
@InProceedings{lowe97hierarchy,
|
||||
Author = "G. Lowe",
|
||||
Title = "A Hierarchy of Authentication Specifications",
|
||||
BookTitle = csfw97,
|
||||
Pages = "31--44",
|
||||
Publisher = {IEEE},
|
||||
year = 1997
|
||||
}
|
||||
|
||||
@book{opsembook,
|
||||
Author = {Cas Cremers and Sjouke Mauw},
|
||||
Title = {Operational Semantics and Verification of Security
|
||||
Protocols},
|
||||
Year = {2012},
|
||||
Publisher = {Springer},
|
||||
Series = {Information Security and Cryptography},
|
||||
}
|
||||
|
||||
@InProceedings{Cr2006multiprotocol,
|
||||
Author = {C.J.F. Cremers},
|
||||
Title = {Feasibility of Multi-Protocol Attacks},
|
||||
BookTitle = {Proc.\ of The First International Conference on
|
||||
Availability, Reliability and Security ({ARES})},
|
||||
Address = "Vienna, Austria",
|
||||
Publisher = "IEEE Computer Society",
|
||||
month = "April",
|
||||
pages = "287--294",
|
||||
year = 2006
|
||||
}
|
||||
|
||||
@InProceedings{kelsey97protocol,
|
||||
author = {J. Kelsey and
|
||||
B. Schneier and
|
||||
D. Wagner},
|
||||
title = {Protocol Interactions and the Chosen Protocol Attack},
|
||||
booktitle = {Fifth International Workshop on Security Protocols},
|
||||
year = {1997},
|
||||
pages = {91--104},
|
||||
editor = {B. Christianson and
|
||||
B. Crispo and
|
||||
T.M.A. Lomas and
|
||||
M. Roe},
|
||||
publisher = sv,
|
||||
series = lncs,
|
||||
volume = {1361},
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user