Abadi, M.: Secrecy by typing in security protocols. JACM 46(5), 749–786 (1999)
MathSciNet
CrossRef
MATH
Google Scholar
Abadi, M., Gordon, A.D.: A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation 148(1), 1–70 (1999)
MathSciNet
CrossRef
MATH
Google Scholar
Bengtson, J., Bhargavan, K., Fournet, C., Gordon, A.D., Maffeis, S.: Refinement types for secure implementations. In: Proceedings of the 21st IEEE Computer Security Foundations Symposium (CSF 2008), pp. 17–32 (2008)
Google Scholar
Bhargavan, K., Fournet, C., Gordon, A.D.: Modular verification of security protocol code by typing. In: Proceedings of POPL 2010, pp. 445–456 (2010)
Google Scholar
Blanchet, B.: From Secrecy to Authenticity in Security Protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 342–359. Springer, Heidelberg (2002)
CrossRef
Google Scholar
Bugliesi, M., Focardi, R., Maffei, M.: Analysis of typed analyses of authentication protocols. In: 18th IEEE Computer Security Foundations Workshop (CSFW-18 2005), pp. 112–125 (2005)
Google Scholar
Bugliesi, M., Focardi, R., Maffei, M.: Dynamic types for authentication. Journal of Computer Security 15(6), 563–617 (2007)
CrossRef
Google Scholar
Cremers, C.J.F.: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In: Proceedings of ACM Conference on Computer and Communications Security (CCS 2008), pp. 119–128 (2008)
Google Scholar
Cremers, C.J.F., Mauw, S.: A family of multi-party authentication protocols - extended abstract. In: Proceedings of WISSEC 2006 (2006)
Google Scholar
Dahl, M., Kobayashi, N., Sun, Y., Hüttel, H.: Type-based automated verification of authenticity in asymmetric cryptographic protocols (2011), full version
http://www.kb.ecei.tohoku.ac.jp/~koba/papers/protocol-full.pdf
Focardi, R., Maffei, M., Placella, F.: Inferring authentication tags. In: Proceedings of the Workshop on Issues in the Theory of Security (WITS 2005). pp. 41–49 (2005)
Google Scholar
Fournet, C., Gordon, A.D., Maffeis, S.: A type discipline for authorization policies. ACM Trans. Prog. Lang. Syst. 29(5) (2007)
Google Scholar
Gordon, A.D., Jeffrey, A.: Typing one-to-one and one-to-many correspondences in security protocols. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 263–282. Springer, Heidelberg (2003)
CrossRef
Google Scholar
Gordon, A.D., Jeffrey, A.: Authenticity by typing for security protocols. Journal of Computer Security 11(4), 451–520 (2003)
CrossRef
Google Scholar
Gordon, A.D., Jeffrey, A.: Types and effects for asymmetric cryptographic protocols. Journal of Computer Security 12(3-4), 435–483 (2004)
CrossRef
Google Scholar
Haack, C., Jeffrey, A.: Cryptyc (2004),
http://www.cryptyc.org/
Kikuchi, D., Kobayashi, N.: Type-based verification of correspondence assertions for communication protocols. In: Shao, Z. (ed.) APLAS 2007. LNCS, vol. 4807, pp. 191–205. Springer, Heidelberg (2007)
CrossRef
Google Scholar
Kikuchi, D., Kobayashi, N.: Type-based automated verification of authenticity in cryptographic protocols. In: Castagna, G. (ed.) ESOP 2009. LNCS, vol. 5502, pp. 222–236. Springer, Heidelberg (2009)
CrossRef
Google Scholar
Pierce, B., Sangiorgi, D.: Typing and subtyping for mobile processes. Mathematical Structures in Computer Science 6(5), 409–454 (1996)
MathSciNet
MATH
Google Scholar
Woo, T.Y., Lam, S.S.: A semantic model for authentication protocols. In: RSP: IEEE Computer Society Symposium on Research in Security and Privacy, pp. 178–193 (1993)
Google Scholar