llsec.bib

Needham1978Using-Encryptio
Using Encryption for Authentication in Large Networks of Computers
Needham, R. M. and Schroeder, M. D.
  Commun. ACM  21  993-999  (1978)
http://portal.acm.org/citation.cfm?id=359659
Dolev1983On-the-security
On the security of public key protocols
Dolev, D. and Yao, A. C.
  IEEE Transactions on Information Theory  29  198-207  (1983)
http://www.cs.huji.ac.il/~dolev/pubs/dolev-yao-ieee-01056650.pdf
Burrows1990A-Logic-of-Auth
A Logic of Authentication
Burrows, M. and Abadi, M. and Needham, R. M.
  ACM Trans. Comput. Syst.  8  18-36  (1990)
http://doi.acm.org/10.1145/77648.77649
Abadi2000Authentication-
Authentication Primitives and Their Compilation
Abadi, M. and Fournet, C. and Gonthier, G.
POPL      302-315  (2000)
http://doi.acm.org/10.1145/325694.325734
Fournet2002Hiding-Names:-P
Hiding Names: Private Authentication in the Applied Pi Calculus
Fournet, C. and Abadi, M.
ISSS      317-338  (2002)
http://research.microsoft.com/copyright/accept.asp?path=/users/fournet/papers/mobile-values-new-names-and-secure-communication.pdf
Gordon2003Authenticity-by
Authenticity by Typing for Security Protocols
Gordon, A. D. and Jeffrey, A.
  Journal of Computer Security  11  451-520  (2003)
http://research.microsoft.com/copyright/accept.asp?path=/users/adg/publications/spi-types-csfw.ps&pub=3
Abadi2004Private-authent
Private authentication
Abadi, M. and Fournet, C.
  Theor. Comput. Sci.  322  427-476  (2004)
http://dx.doi.org/10.1016/j.tcs.2003.12.023
Bhargavan2005A-semantics-for
A semantics for web services authentication
Bhargavan, K. and Fournet, C. and Gordon, A. D.
  Theor. Comput. Sci.  340  102-153  (2005)
http://dx.doi.org/10.1016/j.tcs.2005.03.005