Citations
The paper
has been cited by the following works.
- S. Brackin,
C. Meadows, and J. Millen.
CAPSL interface for the NRL protocol analyzer.
In Proceedings of the 1999 IEEE Conference on Application-Specific
Systems & Software Engineering Technologies ASSET '99. IEEE Computer
Society Press, March 1999.
- R. Brunori.
Uma teoria de primeira ored para especificacao e analise de protocolos de
criptografia.
Master's thesis, Universita Federal Ceara, 1999.
- G. Jacobson.
Formal design of efficient authentication and key-agreement protocols.
In Proceedings of the CMS'99 4th IFIP TC6/TC11 International joint
working Conference on Communications and Multimedia Security, pages
96–108. Kluwer Academic Publishers, September 1999.
- N. Zhang, Q. Shi, and
M. Merabti.
A
flexible approach to secure and fair document exchange.
The Computer Journal, 42(7):569–591, 1999.
(doi:10.1093/comjnl/42.7.569)
- L. Blair and J. Pang.
Feature interactions — life beyond traditional telephony.
In Proceedings of the FIW '00 6th International Workshop on Future
Interactions in Telecommunications and Software, pages 83–93. IOS
Press, May 2000.
- S. Brackin.
Automatically detecting most vulnerabilities in cryptographic protocols.
In Proceedings of the IEEE DISCEX '2000 DARPA Information Survivability
Conference, pages 222–236. IEEE Computer Society, January 2000.
- B. Cheng.
Cse914
– topics for formal methods for software development.
Available online: http://www.cse.msu.edu/ cse914/F02/, January 2003, 2000.
- Justin Childs.
Evaluating the
TLS family of protocols with weakest preconditioning reasoning.
Master's thesis, Florida State University, June 2000.
- E. Saul and
A. Hutchison.
A graphical environment for the facilitation of logic-based security protocol
analysis.
SACJ/SART South Africans Computer Journal, 26:196–200, December
2000.
- E. Saul and
A.C.M. Hutchison.
Two
environments which facilitate security protocol modelling and analysis.
In Proceedings of the 3rd South African Telecommunications, Networks and
Applications Conference (SATNAC '00), 2000.
- P. Syverson and
I. Cevesato.
The logic of authentication protocols.
In Proceedings of the FOSAD'2000 Foundations of Security Analysis and
Design Conference, pages 63–136. Springer Verlag, September 2000.
LNCS 2171.
- Zhaohui Cheng.
Formal
analysis of 3g authentication and key agreement protocol.
Technical Report 3GPP TR 33.902, Middlesex University, 2001.
- J. Jürgens
and G. Wimmel.
Security modelling for electronic commerce: The common electronic purse
specifications.
In Proceedings of the IFIP 1st I3E e-Commerce, e-Business, e-Government
Conference, pages 489–505. IFIP, Kluwer, October 2001.
- Jan Jürjens.
Smart card: Modelling audit security for smart card payment schemes with
UML-SEC.
In Proceedings of the 16th IFIPSEC 2001 International Conference on
Information Security, pages 93–107. Kluwer Academic Publishers, June
2001.
- Nabil El Kadhi.
Analyse statique de programmes en vue de la verification des proprietes
de sécurité cryptographiques.
PhD thesis, Universite de Tunis II, 2001.
In French.
- K. Matusiewicz.
Models and analysis of security in computer networks.
In Proceedings of NEET'2001 New Electronic Technologies and their
Industrial Implementation, 2001.
- E. Saul and
A.C.M. Hutchison.
An
environment to facilitate the teaching of GNY-based security protocol
analysis techniques.
In Proceedings Second World Conference in Information Security
Education, 2001.
- E. Saul and
A.C.M. Hutchison.
Using
Gypsie, Gynger and visual GNY to analyze cryptographic protocols in
Spear II.
In Proceedings Eighth Annual Working Conference on Information Security
Management and Small Systems Security, 2001.
- T. Bohne.
A general intruder for security protocols in MANDE.
Master's thesis, University of Wyoming, 2002.
- Liu Dongxi,
Li Xiaoyong, and Bai Yingcai.
An attack-finding algorithm for security protocols.
Journal of Computer Science and Technology, 17(4):450–463,
2002.
- Myrna C. M dos
Santos, José A. M. Xexéo, and José F. de Rezende.
Anáalise
formal de protocolos de segurança para redes celulares.
Technical Report GTA-02-26, Universidade Federal do Rio de Janeiro/UFRJ,
2002.
- A. J. D'Souza.
Formal analysis on cryptographic protocols.
Master's thesis, Indian Institute of Technology, Bombay, India, May 2002.
- J. Jürjens.
Modelling audit security for smart-card payment schemes with uml-sec.
IFIP TC11 16th International Conference on Information Security, lFIP/Sec
2001, 65:93–107, 2002.
- Jan Jürjens.
Secure Java development with UML.
In Proceedings of the First INetSec '01 International IFIP TC-11 WG 11.4
Working Conference on Network Security. IFIP, Kluwer, November 2002.
- S. Lukell and
H. Hutchison.
Attack construction analysis of cryptographic protocols within a
multidimentional security protocol engineering framework.
Technical report, Cape Town University, 2002.
- Frédéric
Oehl and David Sinclair.
Combining
ISABELLE and Timbuk for cryptographic protocol verification.
In Securité de la Communication sur Intenet: SECI 02, pages
57–67, Tunis, Tunisia, September 2002. INRIA, Le Centre de Calcul El
Khawarizmi.
- F. Oehl, G. Cece,
O. Kouchnarenko, and D. Sinclair.
Automatic approximation
for the verification of cryptographic protocols.
In P. Ryan, editor, Proceedings of the Conference on Formal Aspects of
Security. Springer-Verlag, 2002.
Lecture Notes in Computer Science; Vol 2629.
- J. Pang.
Analysis of a security protocol in μcrl.
CWI Technical Report SEN-R0201, Centrum voor Wiskunde en Informatica,
Amsterdam, The Netherlands, January 2002.
- E. Saul and
A. Hutchison.
Using GYPSIE, GYNGER and visual GNY to analyze cryptographic protocols in
SPEAR II.
IFIP TC11 WG11.1/WG11.2 8th Annual Working Conference on Information
Security Management and Small Systems Security, 72:73–85, 2002.
- G. Wimmel and
J. Jürgens.
Specification-based test generation for security-critical systems using
mutuations.
In Proceedings of the 4th ICFEM2002 International Conference on Formal
Engineering Methods. Springer-Verlag, 2002.
- Dong xi Liu and
Ying cai Bai.
A study on the proof method of authentication protocols based on Strand
space.
Journal of Software, 13(4), 2002.
- R. Breu, K. Burger,
M. Hafner, J. Jürgens, G. Popp, G. Wimmel, and V. Lotz.
Key
issues of a formally based process model for security engineering.
In 16th International Conference Software and Systems Engineering and
their Applications, December 2003.
- Q. Chen, C. Zhang,
S. Zhang, and C. Li.
Verifying the purchase request in SET protocol.
In Web Technologies and Applications: 5th Asia-Pacific Web Conference,
APWeb 2003, pages 263–274. Springer-Verlag, 2003.
Lecture Notes in Computer Science 2642.
- S. Kwon, T. amd Lim.
Automation-considered logic of automation and key distribution.
In Proceedings of the 4th WISA International Workshop on Information
Security Applications, pages 442–457. Springer Verlag, August 2003.
Lecture Notes in Computer Science 2908.
(doi:10.1007/b95188)
- Brendan Lawlor and Linh
Vu.
A
survey of techniques for security architecture analysis.
Technical Report DSTO-TR-1438, DSTO Information Sciences Laboratory, Edinburgh,
South Australia, 2003.
- S. Lukell.
Attack construction analysis of cryptographic protocols within a
multidimentional security protocol engineering framework.
Master's thesis, Cape Town University, August 2003.
- B. Padmanabhan.
Modeling and analysis of security protocols using CASPER.
Master's thesis, Syracuse University, August 2003.
- E. Saul and
A. Hutchison.
Enhanced security protocol engineering through a unified multidimensional
framework.
IEEE Journal on Selected Areas in Communications, 21(1):62–76,
2003.
(doi:10.1109/JSAC.2002.806128)
- (Author
names in Chinese).
Symbolic
model checking analysis for atomicity of Netbill protocol.
Computer Engineering and Applications, 40(2):57–59, 2004.
In Chinese.
- Q. Chen, C. Zhang, and
S. Zhang.
Verifying the payment authorization in SET protocol.
In Intelligent Data Engineering and Automated Learning, volume
2690, pages 914–918. Springer-Verlag, 2004.
Lecture Notes in Computer Science 2690.
(doi:10.1007/b11717)
- R. Jiang, J.-H. Li, and
L. Pan.
Analysis of CCITT X.509 based on strand space model.
Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong
University, 38(SUPPL. 2):169–173, 2004.
- Il Gon Kim.
Formal Analysis and Automatic Code Generation of Security
Protocols.
PhD thesis, Dept. of Computer Science and Engineering, Korea University,
2004.
- M. Steiner.
Secure Group Key agreement.
PhD thesis, Universitas Saraviensis, 2004.
- (Author
names in Chinese).
A security model of
e-commerce based on internet agent.
Microcomputer Applications, 21(1):4–16, 2005.
In Chinese.
- Q. Chen, C. Zhang, and
S. Zhang.
ENDL: A logical framework for verifying secure transaction protocols.
Knowledge and Information Systems, 7(1):84–109, 2005.
(doi:10.1007/s10115-003-0127-4)
- M. Hussain,
I. Hajjeh, H. Afifi, and D. Seret.
Extending IKEv2 for multi-vendor home network environment.
In The 7th International Conference on Advanced Communication Technology,
ICACT 2005, volume 1, pages 63–68, 2005.
- J. Jürjens.
Secure systems development with UML.
Springer Berlin Heidelberg, 2005.
(doi:10.1007/b137706)
- Y. Mo, Y. Zhang, and
X. Li.
Research on the design
principles of security protocol.
Computer Engineering, 31(24):181–185, 2005.
In Chinese.
- A. Pashalides.
Interdomain user authentication and privacy.
PhD thesis, Royal Holloway University of London, 2005.
- W. Teepe.
Integrity and dissemination control in administrative applications through
information designators.
Computer Systems Science and Engineering, 20(5):377–386, 2005.
- G. O. Wimmel.
Model-based Development of Security-Critical Systems.
PhD thesis, Technische Universität München, June 2005.
- C. Zhang and
C. Phoebe.
Mining inconsistent secure messages towards analyzing security protocols.
International Journal of Intelligent Control and Systems,
10(1):77–85, 2005.
- L. Zhang, J. Yin, and
J. Long.
Formal analysis of fairness of the ZG protocol.
In P. Georgiadis, S. Gritzalis, and Y. Marias, editors, Proceedings of
the 1st IEEE International Conference on Pervasive Services ICPS 2005 —
Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous
Computing SecPerU'05, pages 111–118, 2005.
- M. Zhao.
Performance Evaluation of Distributed security protocols using discrete
event simulation.
PhD thesis, Dartmouth College, 2005.
- M. Hussain and
D. Seret.
A comparative study of security protocols validation tools: HERMES vs.
AVISPA.
In 8th International Conference Advanced Communication Technology, ICACT
2006 — Proceedings, pages 303–308, 2006.
- M. Mongiello.
Finite-state verification of the ebXML protocol.
Electronic Commerce Research and Applications, 5(2):147–169,
2006.
(doi:10.1016/j.elerap.2005.09.002)
- P. Ocenasek and
M. Sveda.
An approach to automated design of security protocols.
In Proceedings of the International Conference on Networking,
International Conference on Systems andInternational Conference on Mobile
Communications and Learning Technologies, ICN/ICONS/MCL'06, volume
2006, pages 77–85, 2006.
(doi:10.1109/ICNICONSMCL.2006.47)
- S. Basagiannis,
P. Katsaros, and A. Pombortsis.
Intrusion attack tactics for the model checking of e-commerce security
guarantees.
In Computer Safety, Reliability, and Security, pages 238–251.
Springer Verlag, 2007.
Lecture Notes in Computer Science 4680.
(doi:10.1007/978-3-540-75101-4_22)
- L. Grunske, P. Lindsay,
E. Bondarev, Y. Papadopoulos, and D. Parker.
An outline of an architecture-based method for optimizing dependability
attributes of software-intensive systems.
Lecture Notes in Computer Science, 4615:188–209, 2007.
- H. Tao and D. He.
Normal forms and normalization of authentication protocols.
In 2006 International Conference on Computational Intelligence and
Security, ICCIAS 2006, volume 2, pages 1363–1366, 2007.
(doi:10.1109/ICCIAS.2006.295282)
- A. Zisman.
A static verification framework for secure peer-to-peer applications.
In Second International Conference on Internet and Web Applications and
Services, ICIW'07, 2007.
(doi:10.1109/ICIW.2007.11)
- Q. Chen, S. Zhang, and
Y.-P.P. Chen.
Rule-based dependency models for security protocol analysis.
Integrated Computer-Aided Engineering, 15(4):369–380, 2008.
- Qingfeng Chen, Chengqi
Zhang, and Shichao Zhang.
Secure Transaction Protocol Analysis: Models and Applications.
Springer-Verlag, 2008.
Lecture Notes in Computer Science 5111.
(doi:10.1007/978-3-540-85074-8_1)
- Y. Hanna, H. Rajan, and
W. Zhang.
Slede: A domain-specific verification framework for sensor network security
protocol implementations.
In WiSec'08: Proceedings of the 1st ACM Conference on Wireless Network
Security, pages 109–118, 2008.
(doi:10.1145/1352533.1352551)
- A. Nabih, A. Hossain,
S. Shepherd, and M. Khaled.
"where you are" based authentication: An improved security protocol using BAN
logic.
In 7th European Conference on Information Warfare and Security 2008, ECIW
2008, pages 153–162, 2008.
- Sufatrio and R.H.C.
Yap.
Extending BAN logic for reasoning with modern PKI-based protocols.
In 2008 IFIP International Conference on Network and Parallel Computing,
NPC 2008, pages 190–197, 2008.
(doi:10.1109/NPC.2008.86)
- Z. Aixin, T. Junhua, and
W. Peng.
Authentication tests based on test type matrix.
In IEEE International Conference on Communications, 2009.
(doi:10.1109/ICC.2009.5198770)
- A. Al-Tameem,
M. Zairi, and M. Kamala.
Critical factors of information security implementation.
In 2009 1st International Conference on Networked Digital Technologies,
NDT 2009, pages 379–385, 2009.
(doi:10.1109/NDT.2009.5272217)
- N.T. Abdelmajid,
M.A. Hossain, S. Shepherd, and K. Mahmoud.
Improved kerberos security protocol evaluation using modified BAN logic.
In Proceedings - 10th IEEE International Conference on Computer and
Information Technology, CIT-2010, 7th IEEE International Conference on
Embedded Software and Systems, ICESS-2010, ScalCom-2010, pages
1610–1615, 2010.
(doi:10.1109/CIT.2010.285)
- N.T. Abdelmajid,
M.A. Hossain, S. Shepherd, and K. Mahmoud.
Location-based kerberos authentication protocol.
In Proceedings - SocialCom 2010: 2nd IEEE International Conference on
Social Computing, PASSAT 2010: 2nd IEEE International Conference on Privacy,
Security, Risk and Trust, pages 1099–1104, 2010.
(doi:10.1109/SocialCom.2010.163)
- S. Basagiannis,
P. Katsaros, and A. Pombortsis.
An intruder model with message inspection for model checking security
protocols.
Computers and Security, 29(1):16–34, 2010.
(doi:10.1016/j.cose.2009.08.003)
- I. Siveroni, A. Zisman,
and G. Spanoudakis.
A UML-based static verification framework for security.
Requirements Engineering, 15(1):95–118, 2010.
(doi:10.1007/s00766-009-0091-y)
- S. Basagiannis,
P. Katsaros, and A. Pombortsis.
Synthesis of attack actions using model checking for the verification of
security protocols.
Security and Communication Networks, 4(2):147–161, 2011.
(doi:10.1002/sec.119)
- W. Ben Jaballah,
M. Mosbah, H. Youssef, O. Ly, and A. Meddeb.
Modeling source authentication protocols in wireless sensor networks using
HLPSL.
In 2011 Conference on Network and Information Systems Security, SAR-SSI
2011, Proceedings, 2011.
(doi:10.1109/SAR-SSI.2011.5931362)
- A.V. Uzunov, E.B.
Fernandez, and K. Falkner.
Engineering security into distributed systems: A survey of methodologies.
Journal of Universal Computer Science, 18(20):2920–3006, 2012.
- S. Boonkrong.
A more secure and efficient Andrew secure RPC protocol.
Security and Communication Networks, 7(11):2063–2077, 2013.
(doi:10.1002/sec.918)
- T.M. El-Sakka and
M. Zaki.
Using predicate-based model checker for verifying e-commerce protocols.
International Journal of Network Security, 16(2):90–101, 2014.
- L. Li, L. Wang, J. Chen,
R. Wang, and Z. Zhang.
Fairness analysis for multiparty nonrepudiation protocols based on improved
strand space.
Discrete Dynamics in Nature and Society, 2014, 2014.
(doi:10.1155/2014/904717)
- Y.N. Zhang, L. Han, and
X. Cao.
Design of network information security system.
4th International Conference on Information Science, Automation and
Material System, ISAM 2014, 1022:257–260, 2014.
(doi:10.4028/www.scientific.net/AMR.1022.257)
- R.A. Abouhogail.
Network security and metrology: A survey.
International Journal of Security and its Applications,
9(11):251–270, 2015.
(doi:10.14257/ijsia.2015.9.11.24)
- A. Safarkhanlou, A. Souri, M. Norouzi, and S.E.H. Sardroud.
Formalizing and verification of an antivirus protection service using model
checking.
In 3rd International Conference on Recent Trends in Computing, ICRTC
2015, volume 57, pages 1324–1331. Elsevier, 2015.
(doi:10.1016/j.procs.2015.07.443)
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.