
Article{
  tag =		 "Abadi98",
  author = 	 "Mart{\'\i}n Abadi",
  title = 	 "On {SDSI}'s linked Local Name Spaces",
  journal = 	 "Journal of Computer Security",
  year = 	 1998,
  volume =	 6,
  number =	 "1--2",
  pages =	 "3--21"
}

Article{
  tag = "AbadiBlanchet05", 
  author = "Mart{\'\i}n Abadi and Bruno Blanchet",
  title = "Analyzing Security Protocols with Secrecy Types and Logic Programs",
  journal = "Journal of the ACM",
  year = 2005,
  volume = 52,
  number = 1,
  pages = "102--146",
  month = "January"
}
                  
Article{
  tag = "AbadiEtAl04",
  author = 	 "Mart{\'\i}n Abadi and Bruno Blanchet and C{\'{e}}dric Fournet",
  title = 	 "{Just Fast Keying} in the Pi Calculus",
  booktitle =	 "Programming Languages and Systems: {ESOP} 2004 Proceedings",
  pages =	 "340--354",
  month =	 "January", 
  year =	 2004,
  editor =	 "David Schmidt",
  number =	 2986,
  series =	 "LNCS",
  publisher =	 "Springer Verlag"
}

Article{
  tag = "AbadiEtAl93",
  author = 	 "Mart{\'\i}n Abadi and Michael Burrows and Butler Lampson and Gordon D. Plotkin",
  title = 	 "A Calculus for Access Control in Distributed Systems",
  journal = 	 "{ACM} Transactions on Programming Languages and Systems",
  year = 	 1993,
  volume =	 15,
  number =	 4,
  pages =	 "706--34",
  month =	 "September"
}



Article{
  tag = "FioreAbadi01",
  author = 	 "Marcelo Fiore and Mart{\'\i}n Abadi",
  title = 	 "Computing Symbolic Models for Verifying Cryptographic Protocols",
  booktitle = "Computer Security Foundations Workshop",
  year = 	 2001,
  month = 	 "June"}

Article{
  tag = "AbadiFournet01",
  author = 	 "Mart{\'\i}n Abadi and C{\'{e}}dric Fournet",
  title = 	 "Mobile Values, New Names, and Secure Communication",
  booktitle =	 "28th ACM Symposium on Principles of Programming Languages ({POPL} '01)",
  pages =	 "104--115",
  year =	 2001,
  month =	 "January"
}

Article{
  tag = "AbadiJurjens01",
    author = "Mart{\'\i}n Abadi and Jan J{u}rjens",
    title = "Formal Eavesdropping and Its Computational Interpretation",
    journal = "LNCS",
    volume = "2215",
    pages = "82ff.",
    year = 2001,
    url = "http://citeseer.nj.nec.com/abadi00formal.html" }

Article{
  tag = "AbadiJurjens00",
  title=	"Formal Eavesdropping and its Computational Interpretation",
  author=	"Mart{\'{\i}}n Abadi and Jan J{u}rjens",
  year=		2000,
  note=		"submitted for publication",
}

Article{
  tag = "AbadiRogaway02",
  author =	 "Mart{\'\i}n Abadi and Phillip Rogaway",
  title =	 "Reconciling two views of cryptography (The computational soundness of formal encryption)",
  journal =	 "Journal of Cryptology",
  year =	 2002,
  volume =	 15,
  number =	 2,
  pages =	 "103--127"}

Article{
  tag = "AbadiRogaway00",
  author = 	 "Mart\'{\i}n Abadi and Phillip Rogaway",
  title = 	 "Reconciling two views of cryptography (The computational soundness of formal encryption)",
  booktitle = 	 "IFIP International Conference on Theoretical Computer Science (IFIP TCS2000)",
  year =	 2000,
  series =	 "LNCS",
  publisher =	 "Springer-Verlag"
}

Article{
  tag = "AbadiGordon97",
  author = 	 "Mart\'{\i}n Abadi and Andrew D. Gordon",
  title = 	 "A Calculus for Cryptographic Protocols: The Spi Calculus",
  booktitle = 	 "4th ACM Conference on Computer and Communications Security",
  pages =	 "36--47",
  year =	 1997,
  month =	 "April",
  publisher =	 "ACM Press",
  annote =	 "From URL http://www.research.digital.com/SRC"
}

Article{
  tag = "AbadiGordon99",
  author = 	 "Mart\'{\i}n Abadi and Andrew D. Gordon",
  title = 	 "A Calculus for Cryptographic Protocols: The Spi Calculus",
  journal = 	 "Information and Computation",
  year = 	 1999,
  volume =	 148,
  number =	 1,
  pages =	 "1--70",
  month =	 "January"
}

Article{
  tag = "AbadiGordon97a",
  author = 	 "Mart\'{\i}n Abadi and Andrew D. Gordon",
  title = 	 "Reasoning about cryptographic protocols in the spi calculus",
  booktitle = 	 "CONCUR 97",
  pages =	 "59--73",
  year =	 1997,
  series =	 "LNCS",
  month =	 "July",
  publisher =	 "Springer-Verlag"
}

Article{
  tag = "AbadiNeedham94",
  author = 	 "Mart\'{\i}n Abadi and Roger Needham",
  title = 	 "Prudent Engineering Practice for Cryptographic Protocols",
  booktitle = 	 "Proceedings, 1994 IEEE Symposium on Research in Security and Privacy",
  year =	 1994,
  organization = "{\sc ieee}",
  publisher =	 "{\sc ieee} Computer Society Press",
  pages =	 "122--136"
}

Article{
  tag = "AbadiTuttle91",
  author = 	 "Mart\'{\i}n Abadi and Mark R. Tuttle",
  title = 	 "A Semantics for a Logic of Authentication",
  booktitle = 	 "Proceedings of the 10th {ACM} Symposium on Principles of Distributed Computing",
  pages =	 "201--216",
  year =	 1991,
  month =	 "August"
}

Article{
  tag = "AbrahametalIBM91",
  author =       "DG Abraham and GM Dolan and GP Double and JV Stevens",
  title =        "Transaction Security Systems",
  journal =      "IBM Systems Journal",
  year =         1991,
  volume =       30,
  number =       2,
  pages =        "206--229"
}

Article{
  tag = "Adam92",
  author = 	 "J. Adam",
  title = 	 "Cryptography = Privacy?",
  journal =	 "IEEE Spectrum",
  year =	 1992,
  pages =	 "29--35",
  month =	 aug
}



Article{
  tag = "AdaoEtAl05",
  author = 	 "Pedro Ad{\~a}o and Gergei Bana and Jonathan Herzog and Andre Scedrov",
  title = 	 "Soundness of Formal Encryption in the Presence of Key-Cycles",
  booktitle =	 "Proceedings of the 10th European Symposium On Research In Computer Security {(ESORICS 2005)}",
  year =	 2005,
  month =	 "September"
}

Article{
  tag = "Ajluni95",
  author =       "C. Ajluni",
  title =        "Two New Imagine Techniques Promise To Improve IC Defect Identification",
  journal =      "Electronic Design",
  volume =       "43",
  number =       14,
  month =        "July",
  year =         1995,
  pages =        "37--38"
}

Article{
  tag = "Akl83",
  author = 	 "Selim G. Akl",
  title = 	 "Digital Signatures: A Tutorial Survey",
  journal =	 "Computer",
  year =	 1983,
  pages =	 "15--24",
  month =	 feb
}


                  


Article{
  tag = "AmadioLugiez00",
  author = 	 "Roberto M. Amadio and Denis Lugiez",
  title = 	 "On the Reachability Problem in Cryptographic Protocols",
  booktitle = "Concur",
  pages = 	 "380--394",
  year = 	 2000,
  number = 	 1877,
  series = 	 "LNCS"}




Article{
  tag = "AndersonKuhn96",
  author =       "Ross Anderson and M. Kuhn",
  title =        "Tamper Resistance - a Cautionary Note",
  booktitle =    "Proceedings of the Second Usenix Workshop on Electronic Commerce",
  pages =        "1--11",
  year =         1996
}

Article{
  tag = "AndersonKuhn97",
  author =       "Ross Anderson and Markus Kuhn",
  title =        "Low Cost Attacks on Tamper Resistant Devices",
  booktitle =    "{IWSP}: International Workshop on Security Protocols",
  series = "LNCS",
  year =         1997
}

Article{
  tag = "AndersonNeedham",
  author =       "R. Anderson and R. Needham",
  title =        "Programming Satan's Computer",
  journal =      "Computer Science Today",
  series = "LNCS",
  volume =       "1000",
  year =         1995,
  pages =        "426--441"
}

Article{
 tag = "ACGMMR2006composing",
 title = "Sufficient Conditions for Composing Security Protocols",
 author = "S. Andova and C.J.F. Cremers and K. Gj{\o}steen and S. Mauw and S.F. Mj{\o}lsnes and S. Radomirovi\'{c}",
 booktitle = "Special issue on Computer Security: Foundations and Automated Reasoning",
 journal = "Information and Computation",
 year = 2007
}
                 

Article{
  tag = "AnsonMitchell90",
  author = 	 "Colin l'Anson and Chris Mitchell",
  title = 	 "Security Defects in the CCITT Recommendation {X}.509 --- The Directory Authentication Framework",
  journal =	 "Computer Communication Review",
  year =	 1990,
  volume =	 20,
  number =	 2,
  pages =	 "30-34",
  month =	 apr
}

Article{
  tag = "Anteniese99",
 author = "Ateniese, Giuseppe",
 title = "Efficient verifiable encryption (and fair exchange) of digital signatures",
 booktitle = "CCS '99: Proceedings of the 6th ACM conference on Computer and communications security",
 year = 1999,
 isbn = "1-58113-148-8",
 pages = "138--146",
 location = "Kent Ridge Digital Labs, Singapore",
 doi = "http://doi.acm.org/10.1145/319709.319728",
 publisher = "ACM",
 address = "New York, NY, USA",
 }                  

Article{
  tag = "AppelFelten99",
  author = 	 "Andrew W. Appel and Edward W. Felten",
  title = 	 "Proof-Carrying Authentication",
  booktitle =	 "6th {ACM} Conference on Computer and Communications Security",
  year =	 1999,
  month =	 "November"
}

Article{
  tag = "AristotleNE",
  author =	 "Aristotle",
  title = 	 "Nicomachean Ethics",
  publisher = 	 "Oxford University Press",
  year = 	 1953
}

Article{
  tag = "ASN1",
  author =	 "ISO",
  title =	 "Abstract Syntax Notation One ({ASN.1})",
  howpublished = "ISO/IEC 8824"
}
                  

Article{
  tag = "AsokanEtAl00",
  title= "Optimistic fair exchange of digital signatures",
  author= "N. Asokan and Victor Shoup and Michael Waidner",
  journal= "{IEEE} J. Sel.~Areas in Comms.",
  volume= 18,
  number= 4,
  pages= "593--610",
  year= 2000
}

Article{
  tag = "AsokanEtAl97",
  author = 	 "N. Asokan and Matthias Schunter and Michael Waidner",
  title = 	 "Optimistic Protocols for Fair Exchange",
  booktitle = "4th Conference on Computer and Communications Security ({CCS})",
  pages = 	 "6--17",
  year = 	 1997,
  publisher = "{ACM}"}

Article{
  tag = "rfc1826",
  author = 	 "R. Atkinson",
  title = 	 "{IP} Authentication Header",
  howpublished = "Internet Request for Comments 1826",
  year = 	 1995,
  month = 	 "August",
  note = 	 "Available at \texttt{http://ds.internic.net/rfc/rfc1826.txt}.",
}

Article{
  tag = "BackesEtAl02",
  author =	 "Michael Backes and Christian Jacobi and Birgit Pfitzmann",
  title =	 "Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation",
  booktitle =	 "Formal Methods Europe '02 (FME)",
  pages =	 "310--329",
  year =	 2002,
  series =	 "LNCS",
  volume =	 2391,
  publisher =	 "Springer Verlag"
}

Article{
  tag = "BackesPfitzmann05",
  author = 	 "Michael Backes and Birgit Pfitzmann",
  title = 	 "Relating Cryptographic and Symbolic Key Secrecy",
  booktitle = "Proceedings, 26th {IEEE} Symposium on Security and Privacy",
  year = 	 2005,
  month = 	 "May",
  note = 	 "Extended version, \url{http://eprint.iacr.org/2004/300}"}

                  

Article{
  tag = "BackesEtAl08",
  author = 	 "Michael Backes and Matteo Maffei and Dominique Unruh",
  title = 	 "Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the {Direct Anonymous Attestation} Protocol",
  booktitle = "{IEEE} Symposium on Security and Privacy",
  year = 	 2008}

Article{
  tag = "MaffeiEtAl07",
 author = "Michael Backes and Agostino Cortesi and Riccardo Focardi and Matteo Maffei",
 title = "A calculus of challenges and responses",
 booktitle = "FMSE '07: ACM Workshop on Formal methods in Security Engineering",
 year = 2007,
 isbn = "978-1-59593-887-9",
 pages = "51--60",
 location = "Fairfax, Virginia, USA",
 doi = "http://doi.acm.org/10.1145/1314436.1314444",
 publisher = "ACM",
 address = "New York, NY, USA",
 }


Article{
  tag = "rfc1827",
  author = 	 "R. Atkinson",
  title = 	 "{IP} Encapsulating Security Payload {(ESP)}",
  howpublished = "Internet Request for Comments 1827",
  year = 	 1995,
  month = 	 "August",
  note = 	 "Available at \texttt{http://ds.internic.net/rfc/rfc1827.txt}.",
}

Article{
  tag = "BartalEtAl99",
  author = 	 "Yair Bartal and Alain Mayer and Kobbi Nissim and Avishai Wool",
  title = 	 "Firmato: A Novel Firewall Management Toolkit",
  booktitle = 	 "Proceedings, {IEEE} Symposium on Security and Privacy",
  year =	 1999,
  month =	 "May",
  publisher =	 "IEEE CS Press"
}

Article{
  tag = "BasinEtAl05", 
  author    = "Alessandro Armando and David A. Basin and Yohan Boichut and Yannick Chevalier and Luca Compagna and Jorge Cu{\'e}llar and Paul Hankes Drielsma and Pierre-Cyrille H{\'e}am and Olga Kouchnarenko and Jacopo Mantovani and Sebastian M{o}dersheim and David von Oheimb and Micha{e}l Rusinowitch and Judson Santiago and Mathieu Turuani and Luca Vigan{\`o} and Laurent Vigneron",
  title     = "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications",
  booktitle = "CAV",
  year      = 2005,
  pages     = "281-285",
  ee        = "http://dx.doi.org/10.1007/11513988_27",
  crossref  = "DBLP:conf/cav/2005",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}
                  
Article{
  tag =  "CaleiroEtAl2005",
  title= "Relating strand spaces and distributed temporal logic for security protocol analysis",
  author= "Caleiro, C. and Vigano, L. and Basin, D.",
  journal= "Logic Journal of IGPL",
  volume= "13",
  number= "6",
  pages= "637",
  year= "2005",
  publisher= "Oxford Univ Press"
}

Article{
  tag = "DBLP:conf/cav/2005",
  editor    = "Kousha Etessami and Sriram K. Rajamani",
  title     = "Computer Aided Verification, 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings",
  booktitle = "CAV",
  publisher = "Springer",
  series    = "LNCS",
  volume    = "3576",
  year      = 2005,
  isbn      = "3-540-27231-3",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}


Article{
  tag = "BeckerSewell04",
  author = 	 "Moritz Y. Becker and Peter Sewell",
  title = 	 "Cassandra: Flexible Trust Management, Applied to Electronic Health Records",
  booktitle =	 "17th Computer Security Foundations Workshop",
  pages =	 "139--154",
  year =	 2004,
  address =	 "Asilomar, CA",
  month =	 "June",
  publisher =	 "{IEEE CS} Press"
}

Article{
  tag = "BellLaPadula75",
  author = 	 "David E. Bell and Leonard J. LaPadula",
  title = 	 "Computer Security Model:  Unified Exposition and {Multics} Interpretation",
  institution =  "ESD",
  year = 	 1975,
  number =	 "75-306",
  month =	 "June"
}

Article{
  tag = "BellaEtAl01",
  author = 	 "Giampaolo Bella and Fabio Massacci and Lawrence C. Paulson",
  title = 	 "Verifying the {SET} Purchase Protocols",
  institution =  "Cambridge University Computer Laboratory",
  year = 	 2001,
  type = 	 "Report",
  number = 	 524,
  month = 	 "November",
  note = 	 "Short version appeared in International Joint Conference on Automated Reasoning, June, 2001.  Available at http://www.cl.cam.ac.uk/\-users/\-lcp/\-papers/\-protocols.html"
}

Article{
  tag = "Bellare98",
  author = 	 "Mihir Bellare",
  title = 	 "Practice-Oriented Provable Security",
  booktitle = 	 "First International Workshop on Information Security ({ISW} 97)",
  year =	 1998,
  editor =	 "E. Okamoto and G. Davida and M. Mambo",
  volume =	 1396,
  series =	 "LNCS",
  publisher =	 "Springer Verlag"
}

Article{
  tag = "BellareKillianRogaway94",
  author = 	 "Mihir Bellare and J. Killian and Phillip Rogaway",
  title = 	 "The Security of Cipher Block Chaining",
  booktitle = 	 "Advances in Cryptology --- Crypto 94",
  year =	 1994,
  editor =	 "Yvo Desmedt",
  volume =	 839,
  series =	 "LNCS",
  publisher =	 "Springer Verlag"
}

Article{
  tag = "BellareRogaway93",
  author = 	 "Mihir Bellare and Phillip Rogaway",
  title = 	 "Entity Authentication and Key Distribution",
  booktitle = 	 "Advances in Cryptology -- Crypto '93 Proceedings",
  year =	 1993,
  publisher =	 "Springer-Verlag",
  note =	 "Full version available at http://www-cse.ucsd.edu/users/mihir/papers/eakd.ps"
}

Article{
  tag = "BellareRogaway93a",
  author = 	 "Mihir Bellare and Phillip Rogaway",
  title = 	 "Random Oracles are Practical: a paradigm for designing efficient protocols",
  booktitle = 	 "Proceedings, {ACM} Conference on Communications and Computer Security",
  year =	 1993,
  pages =	 "62--73",
  publisher =	 "{ACM}",
  note =	 "Full version available at http://www-cse.ucsd.edu/users/mihir/papers/"
}

Article{
  tag = "BellerChangYacobi93",
  author = 	 "Michael J. Beller and Li-Fung Chang and Yacov Yacobi",
  title = 	 "Privacy and Authentication on a Portable Communications System",
  journal =	 "Journal on Selected Areas in Communications",
  year =	 1993,
  volume =	 11,
  number =	 6,
  pages =	 "821--829",
  month =	 aug
}

Article{
  tag = "BellovinMerrit90",
  author = 	  "S. M. Bellovin and M. Merrit",
  title = 	 "Limitations of the {Kerberos} Authentication System",
  journal =	 "Computer Communication Review",
  year =	 1990,
  volume =	 20,
  number =	 5,
  pages =	 "119--132",
  month =	 oct,
}

Article{
  tag = "BellovinMerrit92",
  author = 	 "S. M. Bellovin and M. Merrit",
  title = 	 "Encrypted Key Exchange: Password based protocols secure against dictionary attacks",
  pages =	 "72--84",
  booktitle =	 "Proceedings 1992 IEEE Symposium on Research in Security and Privacy",
  year =	 1992,
  publisher =	 "IEEE Computer Society",
  month =	 may
}

Article{
  tag = "Bellovin96",
  author = 	 "Steven Bellovin",
  title = 	 "Problem Areas for the {IP} Security Protocols",
  booktitle = 	 "Proceedings of the Sixth USENIX {UNIX} Security Symposium",
  year =	 1996,
  month =	 "July",
  note =	 "Also at ftp://ftp.research.att.com/dist/smb/badesp.ps"
}

Article{
  tag = "BessonEtAl01",
  author = 	 "F. Besson and T. Jensen and D. L. M{\'e}tayer and T. Thorn",
  title = 	 "Model Checking Security Properties of Control Flow Graphs",
  journal = 	 "Journal of Computer Security",
  year = 	 2001,
  volume =	 9,
  pages =	 "217--250"
}

Article{
  tag = "DBLP:conf/lpar/BezemC05",
  author    = "Marc Bezem and Thierry Coquand",
  title     = "Automating Coherent Logic",
  booktitle = "{LPAR}, Logic for Programming, Artificial Intelligence, and Reasoning",
  year      = 2005,
  pages     = "246-260",
  series    = "LNCS",
  volume    = 3835,
  ee        = "http://dx.doi.org/10.1007/11591191_18",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}
Article{
  tag = "DBLP:conf/lpar/2005",
  editor    = "Geoff Sutcliffe and Andrei Voronkov",
  title     = "Logic for Programming, Artificial Intelligence, and Reasoning, 12th International Conference, LPAR 2005, Montego Bay, Jamaica, December 2-6, 2005, Proceedings",
  booktitle = "LPAR",
  publisher = "Springer",
  series    = "LNCS",
  volume    = "3835",
  year      = 2005,
  isbn      = "3-540-30553-X",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}

Article{
  tag = "Bieber90",
  author = 	 "P. Bieber",
  title = 	 "A Logic of Communication in a Hostile Environment",
  pages =	 "14--22",
  booktitle =	 "Proceedings of the Computer Security Foundations Workshop III",
  year =	 1990,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "BihamShamir91a",
author =       "E. Biham and A. Shamir",
title =        "Differential Cryptanalysis of DES-like Cryptosystems",
journal =   "Advances in Cryptology -- Proceedings of CRYPTO '90",
year =      1991,
pages =     "3--72"
}

Article{
  tag = "BihamShamir97",
  author =       "Eli Biham and Adi Shamir",
  title =        "Differential Fault Analysis of Secret Key Cryptosystems",
  series =      "LNCS",
  number =       1294,
  year =         1997
}

Article{
  tag = "BirdGopalHerzbergJansonKuttenMolvaYung91",
  author = 	 "R. Bird and I. Gopal and A. Herzberg and P. A. Janson and S. Kutten and R. Mulva and M. Yung",
  title = 	 "Systematic Design of Two-Party Authentication Protocols",
  editor =	 "J. Feigenbaum",
  series =       "LNCS",
  number =	 576,
  pages =	 "44--61",
  booktitle =	 "Proceedings of Crypto '91: Advances in Cryptology ",
  year =	 1991,
  publisher =	 "Springer Verlag"
}

Article{
  tag = "BirdGopalHerzbergJansonKuttenMolvaYung93",
  author = 	 "R. Bird and I. Gopal and A. Herzberg and P. A. Janson and S. Kutten and R. Mulva and M. Yung",
  title = 	 "Systematic Design of a Family of Attack-Resistant Authentication protocols",
  journal =	 "IEEE Journal on Selected Areas in Communications",
  year =	 1993,
  volume =	 11,
  number =	 5,
  pages =	 "679--693"
}

Article{
  tag = "Birrell85",
  author = 	 "A. D. Birrell",
  title = 	 "Secure Communication using Remote Procedure Calls",
  journal =	 "ACM Transactions on Operating Systems",
  year =	 1985,
  volume =	 3,
  number =	 1,
  pages =	 "1--14",
  month =	 feb
}

Article{
  tag = "Blakely79",
  author =       "G. R. Blakely",
  title =        "Safeguarding Cryptographic Keys.",
  pages =        "313--317",
  booktitle =    "Proceedings AFIPS 1979 National Computer Conference",
  year =         1979,
  publisher =    AFIPS
}

Article{
  tag = "Blanchet01",
  author = 	 "Bruno Blanchet",
  title = 	 "An Efficient Protocol Verifier based on {Prolog} Rules",
  booktitle =	 "14th Computer Security Foundations Workshop",
  pages =	 "82--96",
  year =	 2001,
  month =	 "June",
  publisher =	 "IEEE CS Press"
}

Article{
  tag = "Blanchet02",
  author = 	 "Bruno Blanchet",
  title = 	 "From Secrecy to Authenticity in Security Protocols",
  booktitle =	 "9th Static Analysis Symposium",
  pages =	 "342--359",
  number =	 2477,
  series =	 "LNCS",
  month =	 "September",
  year =	 2002,
  publisher =	 "Springer Verlag"
}

Article{
  tag =  "Blanchet04",
  title= "Automatic proof of strong secrecy for security protocols",
  author= "Blanchet, B.",
  booktitle= "Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on",
  year= 2004,
  month= "May",
  publisher = 	 "IEEE CS Press",
  pages= " 86-100" }


Article{
  tag = "Blanchet08",
  AUTHOR = "Bruno Blanchet",
  TITLE = "V{\'e}rification automatique de protocoles cryptographiques:  mod{\`e}le formel et mod{\`e}le calculatoire. Automatic verification of security protocols: formal model and computational model",
  SCHOOL = "Universit{\'e} Paris-Dauphine",
  YEAR = 2008,
  TYPE = "M{\'e}moire d'habilitation \`a diriger des recherches",
  MONTH = NOV
}

Article{
  tag = "BlanchetPodelski03",
  author = 	 "Bruno Blanchet and Andreas Podelski",
  title = 	 "Verification of Cryptographic Protocols:  Tagging Enforces Termination",
  booktitle =	 "Foundations of Software Science and Computation Structures",
  pages =	 "136--152",
  year =	 2003,
  series =	 "LNCS",
  month =	 "April"
}

Article{
  tag = "Boebert85",
  author =       "W. E. Boebert and R. Y. Kain",
  title =        "A Practical Alternative to Hierarchical Integrity Policies",
  booktitle =    "Proceedings of the Eighth National Computer Security Conference",
  year =         1985
}

Article{
  tag = "BlazeEtAl97",
  author = 	 "Matt Blaze and Joan Feigenbaum and Jack Lacy",
  title = 	 "Distributed Trust Management",
  booktitle =	 "Proceedings, 1996 {IEEE} Symposium on Security and Privacy",
  pages =	 "164--173",
  year =	 1997,
  month =	 "May"
}

Article{
  tag = "BlazeEtAl99",
  author =	 "Matt Blaze and Joan Feigenbaum and John Ioannidis and Angelos D. Keromytis",
  title =	 "The {KeyNote} Trust Management System, version 2",
  howpublished = "{IETF RFC} 2704",
  month =	 "September",
  year =	 1999
}

Article{
  tag = "BonehEtAl97",
  author =       "Dan Boneh and Richard A. DeMillo and Richard J. Lipton",
  title =        "On the Importance of Checking Cryptographic Protocols for Faults",
  series =      "LNCS",
  number =       1233,
  pages =        "37--51",
  year =         1997
}

Article{
  tag = "BonehEtAl98",
  author =       "Bill Aiello and Dan Boneh and Matthew Franklin and Jeremy Horwitz",
  title =        "Protocols for Secure Generation of Shared {RSA} Keys",
  institution =  "Standford University",
  year =         1998,
  note =         "DARPA Contract F30602-97-C-0326, Data Item Number A007: Technical Information Report"
}

Article{
  tag = "Boneh98",
  author = 	 "Dan Boneh",
  title = 	 "The decision {Diffie--Hellman} problem",
  booktitle = 	 "Proceedings of the Third Algorithmic Number Theory Symposium",
  pages =	 "48--63",
  year =	 1998,
  number =	 1423,
  series =	 "LNCS",
  publisher =	 "Springer--Verlag"
}

Article{
  tag = "BonehFranklin97",
  author =       "D. Boneh and M. Franklin",
  title =        "Efficient Generation of Shared RSA Keys",
  series =       "LNCS",
  number =       1233,
  pages =        "425--439",
  booktitle =    "Proceedings of Crypto '97",
  year =         1997,
  publisher =    "Springer Verlag"
}

Article{
  tag = "Boreale01",
  author = 	 "Michele Boreale",
  title = 	 "Symbolic Trace Analysis of Cryptographic Protocols",
  booktitle =	 "{ICALP}",
  year =	 2001
}

Article{
  tag = "Bovenlander",
  author =       "E. Bovenlander and RL van Renesse",
  title =        "Smartcards and Biometrics: An Overview",
  booktitle =    "Computer Fraud and Security Bulletin",
  year =         1995,
  pages =        "8--12"
}

Article{
  tag = "Boyd90",
  author = 	 "Colin Boyd",
  title = 	 "Hidden Assumptions in Cryptographic Protocols",
  journal =	 "Proceedings of the IEE",
  year =	 1990,
  volume =	 "137 Pt E",
  number =	 6,
  pages =	 "433--436",
  month =	 nov,
}

Article{
  tag = "Boyd92",
  author =       "C. Boyd",
  title =        "A Formal Framework for Authentication",
  pages =        "273--292",
  booktitle =    "Proceedings ESORICS 92",
  editor =       "Y. Deswarte and G. Eizenberg and J.-J. Quisquater",
  series = "LNCS", 
  number = 648,
  publisher =    "Springer",
  year =         1992,
}

Article{
  tag = "BoydMao94a",
  title = 	 "Designing Secure Key Exchange Protocols",
  year = 	 1994,
  pages =        "93--106",
  editor =       "Dieter Gollmann",
  booktitle=	 "Computer Security---{ESORICS} '94",
  author =	 "Colin Boyd and Wenbo Mao",
  publisher =	 "Springer-Verlag"
}

Article{
  tag = "BraceEtAl90",
  author = 	 "Karl S. Brace and Richard L. Rudell and Randal E. Bryant",
  title = 	 "Efficient Implementation of a {BDD} Package",
  booktitle = 	 "27th {ACM/IEEE} Design Automation Conference",
  pages =	 "40--45",
  year =	 1990
}

                  

Article{
  tag = "BrickellCamenischChen04",
  author = 	 "Ernie Brickell and Jan Camenisch and Liqun Chen",
  title = 	 "Direct Anonymous Attestation",
  booktitle = "ACM Conference on Communications and Computer Security ({CCS})",
  year = 	 2004,
  note = 	 "Full version available at \url{http://eprint.iacr.org/2004/205}"}

Article{
  tag = "BrickellOdlyzko88",
  author = 	 "E. F. Brickell and A. M. Odlyzko",
  title = 	 "Cryptanalysis: A Survey of Recent Results",
  journal =	 "Proceedings of the IEEE",
  year =	 1988,
  volume =	 76,
  number =	 5,
  month =	 may
}

Article{
  tag = "BroadfootLowe03",
  author = 	 "Philippa Broadfoot and Gavin Lowe",
  title = 	 "On Distributed Security Transactions that use Secure Transport Protocols",
  booktitle =	 "Proceedings, 16th Computer Security Foundations Workshop",
  pages =	 "63--73",
  year =	 2003,
  publisher =	 "{IEEE} {CS} Press"
}

Article{
  tag = "Bryant86",
  author = 	 "Randal E. Bryant",
  title = 	 "Graph-Based Algorithms for Boolean Function Manipulation",
  journal = 	 "IEEE Transactions on Computers",
  year = 	 1986,
  volume =	 "C-35",
  number =	 8,
  pages =	 "677--691",
  month =	 "August"
}

Article{
  tag = "BurrowsAbadiNeedham89",
  author = 	 "Michael Burrows and Mart\'{\i}n Abadi and Roger Needham",
  title = 	 "A Logic of Authentication",
  journal = 	 "Proceedings of the Royal Society",
  year = 	 1989,
  volume =	 "Series A, 426",
  number =	 1871,
  pages =	 "233--271",
  month =	 "December",
  note =	 "Also appeared as SRC Research Report 39 and, in a shortened form, in ACM Transactions on Computer Systems 8, 1 (February 1990), 18-36. "
}

Article{
  tag = "BurrowsAbadiNeedham89a",
  author = 	 "Michael Burrows and Mart\'{\i}n Abadi and Roger Needham",
  title = 	 "A Logic of Authentication",
  institution =  "Digital Systems Research Center",
  year = 	 1989,
  type =	 "Technical Report",
  number =	 39,
  month =	 feb
}

Article{
  tag = "BurrowsAbadiNeedham90",
  author = 	 "Michael Burrows and Mart\'{\i}n Abadi and Roger M. Needham",
  title = 	 "Rejoinder to {Nessett}",
  journal =	 "ACM Operating Systems Review",
  year =	 1990,
  volume =	 24,
  number =	 2,
  pages =	 "39--40",
  month =	 apr
}

Article{
  tag = "BurrowsAbadiNeedham94",
  author = 	 "Michael Burrows and Mart\'{\i}n Abadi and Roger M. Needham",
  title = 	 "The Scope of a Logic of Authentication",
  institution =  "Digital Systems Research Center",
  year = 	 1994,
  type =	 "Revised Research Report",
  number =	 39
}

Article{
  tag = "ButtyanEtAl98",
  author = 	 "Levente Butty{\'a}n and Sebastian Staamann and Uwe Wilhelm",
  title = 	 "A Simple Logic for Authentication Protocol Design",
  booktitle =	 "11th {IEEE} Computer Security Foundations Workshop",
  pages =	 "153--162",
  year =	 1998
}

Article{
  tag = "CCITTX509",
  title = 	 "The Directory-Authentication Framework",
  author =	 "{C. C. I. T. T. Recommendation X.509}",
  organization = "C. C. I. T. T.",
  year =	 1988,
  month =	 dec,
}

Article{
  tag = "CampbellSafavi-NainiPleasants92",
  author = 	 "E. A. Campbell and R. Safavi-Naini and P. A. Pleasants",
  title = 	 "Partial Belief and Probabilistic Reasoning in the Analysis of Secure Protocols",
  pages =	 "84--91",
  booktitle =	 "Proceedings 5th IEEE Computer Security Foundations Workshop",
  year =	 1992,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "Canetti01",
  author =	 "Ran Canetti",
  title =	 "Universally Composable Security: A New Paradigm for Cryptographic Protocols",
  institution =	 "International Association for Cryptographic Research",
  year =	 2001,
  type =	 "Report",
  number =	 "2000/067",
  month =	 Oct,
  note =	 "Extended Abstract appeared in proceedings of the 42nd Symposium on Foundations of Computer Science (FOCS), 2001",
  online =	 "http://eprint.iacr.org/2000/067.ps.gz",
}


Article{
  tag = "CanettiHerzog06",
  author = 	 "Ran Canetti and Jonathan Herzog",
  title = 	 "Universally composable symbolic analysis of mutual authentication and key exchange protocols",
  booktitle = "Proceedings, Theory of Cryptography Conference (TCC)",
  year = 	 2006,
  month = 	 "March"}

Article{
  tag = "CanettiKrawczyk02",
  author =	 "Ran Canetti and Hugo Krawczyk",
  title =	 "Universally Composable Notions of Key Exchange and Secure Channels",
  booktitle =	 "Eurocrypt 2002",
  pages =	 "337--351",
  series =	 "LNCS",
  publisher =	 "Springer Verlag",
  year =	 2002
}

Article{
  tag = "CarboneEtAl03",
  author = 	 "Marco Carbone and Mogens Nielsen and Vladimiro Sassone",
  title = 	 "A Formal Model for Trust in Dynamic Networks",
  booktitle =	 "International Conference on Software Engineering and Formal Methods",
  year =	 2003,
  editor =	 "Antonio Cerone",
  month =	 "September",
  publisher =	 "{IEEE CS} Press"
}
                  
Article{
  tag = "CarboneEtAl07",
  author    = "Marco Carbone and Kohei Honda and Nobuko Yoshida",
  title     = "Structured Communication-Centred Programming for Web Services",
  booktitle = "Programming Languages and Systems, 16th European Symposium on Programming, ESOP 2007",
  year      = 2007,
  pages     = "2-17",
  ee        = "http://dx.doi.org/10.1007/978-3-540-71316-6_2",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}



Article{
  tag = "Carlsen94a",
  author = 	 "Ulf Carlsen",
  title = 	 "Cryptographic Protocol Flaws",
  booktitle =	 "Proceedings 7th IEEE Computer Security Foundations Workshop",
  publisher =	 "IEEE Computer Society",
  year =	 1994,
  pages =	 "192--200"
}

Article{
  tag = "Carlsen94b",
  author = 	 "Ulf Carlsen",
  title = 	 "Generating Formal Cryptographic Protocol Specifications",
  booktitle =	 "Proceedings 7th IEEE Computer Security Foundations Workshop",
  year =	 1994,
  organization = "IEEE Computer Society Press"
}

Article{
  tag = "Carlsen94c",
  author = 	 "Ulf Carlsen",
  title = 	 "Optimal Privacy and Authentication on a Portable Communications System",
  journal =	 "Operating Systems Review",
  year =	 1994,
  volume =	 28,
  number =	 3,
  pages =	 "16--23"
}

Article{
  tag = "CarterWegman79",
  author = 	 "J. Lawrence Carter and Mark N. Wegman",
  title = 	 "Universal Classes of Hash Functions",
  journal = 	 "Journal of Computer and System Sciences",
  year = 	 1979,
  volume =	 18,
  pages =	 "143--54"
}

Article{
  tag = "WegmanCarter81",
  author = 	 "Mark N. Wegman and J. Lawrence Carter",
  title = 	 "New Hash Functions and Their Use in Authentication and Set Equality",
  journal = 	 "Journal of Computer and System Sciences",
  year = 	 1981,
  volume =	 22,
  pages =	 "265--79"
}



Article{
  tag = "CederquistEtAl07",
  author = 	 "Jan Cederquist and Mohammad Torabi Dashti and Sjouke Mauw",
  title = 	 "A Certified Email Protocol using Key Chains",
  booktitle = "Advanced Information Networking and Applications Workshops/Symposia {(AINA'07)}, Symposium on Security in Networks and Distributed Systems {(SSNDS07)}",
  pages = 	 "525--530",
  year = 	 2007,
  volume = 	 1,
  publisher = "IEEE CS Press"}

Article{
  tag = "MitchellEtAl99",
  author = 	 "I. Cervesato and N. A. Durgin and P. D. Lincoln and J. C. Mitchell and A. Scedrov",
  title = 	 "A Meta-Notation for Protocol Analysis",
  booktitle = 	 "Proceedings, 12th {IEEE} Computer Security Foundations Workshop",
  year =	 1999,
  month =	 "June",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "CervesatoEtAl00",
  author = 	 "I. Cervesato and N. A. Durgin and P. D. Lincoln and J. C. Mitchell and A. Scedrov",
  title = 	 "Relating Strands and Multiset Rewriting for Security Protocol Analysis",
  booktitle = 	 "Proceedings, 13th {IEEE} Computer Security Foundations Workshop",
  year =	 2000,
  month =	 "July",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "CeriGottlobTanca89",
  author = 	 "Stefano Ceri and Georg Gottlob and Letizia Tanca",
  title = 	 "What You Always Wanted to Know About Datalog (And Never Dared to Ask)",
  journal =	 "IEEE Transactions of Knowledge and Data Engineering",
  year =	 1989,
  volume =       1,
  number =       1
}


Article{
  tag = "ChadhaEtAl01",
  author = 	 "Rohit Chadha and Max Kanovich and Andr{\'e} Scedrov",
  title = 	 "Inductive Methods and Contract-Signing Protocols",
  booktitle =	 "Proceedings, 8th {ACM} Conference on Computer and Communications Security",
  pages =	 "176--185",
  year =	 2001,
  editor =	 "Pierangela Samarati",
  address =	 "New York",
  month =	 "November",
  publisher =	 "{ACM} Press"
}



Article{
  tag = "ChadhaEtAl03",
  author = 	 "Rohit Chadha and John C. Mitchell  and  Andre Scedrov and Vitaly Shmatikov",
  title = 	 "Contract Signing, Optimism, and Advantage",
  booktitle = "Concur --- Concurrency Theory",
  pages = 	 "366-382",
  year = 	 2003,
  series = 	 "LNCS",
  publisher = "Springer"}

Article{
  tag = "Chaum83",
  author =       "D. Chaum",
  title =        "Blind Signatures for Untraceable Payments",
  booktitle =    "Advances in Cryptology: proceedings of Crypto 82",
  pages =        "199--203",
  year =         1983,
  publisher =    "Plenum Press"
}

Article{
  tag = "ChengGligor90",
  author = 	 "P.-C. Cheng and Virgil D. Gligor",
  title = 	 "On the Formal Specification and Verification of a Multiparty Session Protocol",
  pages =	 "216--233",
  booktitle =	 "Proceedings of the IEEE 1990 Symposium on Research in Security and Privacy",
  year =	 1990,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "ChenSwiftWarren95",
  author = 	 "W. Chen and T. Swift and D. S. Warren",
  title = 	 "Efficient Top-Down Computation of Queries under the Well-Founded Semantics",
  journal =	 "J. Logic Prog.",
  year =	 1995,
  volume =       24,
  number =       3,
  pages =        "161--199"
}

Article{
  tag = "ChenWarren96",
  author = 	 "W. Chen and D. S. Warren",
  title = 	 "Tabled Evaluation with Delaying for General Logic Programs",
  journal =	 "J. ACM",
  mon =	         jan,
  year =	 1996,
  volume =       43,
  number =       1,
  pages =        "20--74"
}


Article{
  tag = "CheinMugnier92",
    author = "Michel Chein and Marie-Laure Mugnier",
    title = "Conceptual Graphs: fundamental notions",
    journal = "Revue d'Intelligence Artificielle",
    year = 1992,
    volume = "6",
    pages = "365--406"
}

Article{
  tag = "CheinMugnier04",
  author    = "Michel Chein and Marie-Laure Mugnier",
  title     = "Concept Types and Coreference in Simple Conceptual Graphs",
  booktitle = "Conceptual Structures at Work: 12th International Conference on Conceptual Structures, ICCS 2004, Huntsville, AL, USA, July 19-23, 2004. Proceedings",
  year      = 2004,
  series    = "LNCS",
  number    = 3127,
  pages     = "303-318",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}




Article{
  tag = "Choretal85",
  author =       "B. Chor and S. Goldwasser and S. Micali and B. Awerbuch",
  title =        "Verifiable secret sharing and achieving simultaneity in the presence of faults",
  pages =        "383--395",
  booktitle =    "Proceedings of the 26th IEEE Symposium on Foundations of Computer Science",
  year =          1985,
  publisher =     "IEEE"
}

Article{
  tag = "CiscoCommandRef10",
  title = 	 "Router Products Command Reference",
  organization = "Cisco Systems",
  address =	 "San Jose, CA",
  edition =	 "10th",
  year =	 1994,
  note =	 "Chapters 10 to 17 (especially Chapter~16).  For more recent information, see~\url{http://www.cisco.com/univercd/}."
}

Article{
  tag = "DClarkeEtAl01",
  author = 	 "Dwaine Clarke and Jean-Emile Elien and Carl Ellison and Matt Fredette and Alexander Morcos and Ronald L. Rivest",
  title = 	 "Certificate Chain Discovery in {SPKI/SDSI}",
  journal = 	 "Journal of Computer Security",
  year = 	 2001,
  volume =	 9,
  number =	 4,
  pages =	 "285--322"
}

Article{
  tag = "ClarkeEtAl01",
  author = 	 "Edmund M. {Clarke, Jr.} and Orna Grumberg and Doron A. Peled",
  title = 	 "Model Checking",
  publisher = 	 "{MIT} Press",
  year = 	 2001
}

Article{
  tag = "ClarkJacob95",
  author = 	 "John Clark and Jeremy Jacob",
    title = 	 "On The Security of Recent Protocols",
      journal =	 "Information Processing Letters",
	year =	 1995,
	  volume =	 56,
	    number =	 3,
	      pages =	 "151--155",
		month =	 nov
		}
Article{
  tag = "ClarkJacob95a",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "{Security Protocols: An Annotated Bibliography}",
  institution =  "Dept. of Computer Science, University of York",
  year = 	 1995,
  month =	 "June"
}

Article{
  tag = "ClarkJacob95b",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "{A Library of Security Protocols}",
  institution =  "Dept. of Computer Science, University of York",
  year = 	 1995,
  month =	 "June"
}
Article{
  tag = "ClarkJacob95c",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "{A Library of Security Protocols with Attacks}",
  institution =  "Dept. of Computer Science, University of York",
  year = 	 1995,
  month =	 "June"
}

Article{
  tag = "ClarkJacob95d",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "{Implementation Dependencies in Repeated Authentication Protocols}",
  year = 	 1995,
  month = 	 "June",
}

Article{
  tag = "ClarkJacob95e",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "{On the Security of Hwang and Chen's SPLICE/AS Augmented Protocol}",
  year =	 1995,
  month =	 "June",
  note = "University of York, Department of Computer Science"
}

Article{
  tag = "ClarkJacob97a",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "A Survey of Authentication Protocol Literature: Version 1.0",
  year =	 1997,
  month =	 "November",
  note = "University of York, Department of Computer Science"
}

Article{
  tag = "ClarkJacob95f",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "On the {Security of Recent Protocols}",
  note = 	 "Submitted to Information Processing Letters",
  year =	 1995,
  month =	 "July",
  annote =	 "Submitted to Information Processing Letters"
}

Article{
  tag = "ClarkJacob96a",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "Multi-server Spoofing in the {Kerberos} Authentication Protocol",
  year = 	 1996,
  month = 	 jan,
}

Article{
  tag = "ClarkJacob96b",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "Freshness is Not Enough",
  year = 	 1996,
  month = 	 jan,
}

Article{
  tag = "ClarkJacob96c",
  author = 	 "John Clark and Jeremy Jacob",
  title = 	 "Non-Repeatability is Not Enough",
  year = 	 1996,
  month = 	 jan,
}

Article{
  tag = "ClarkeJhaMarrero98",
  author = 	 "Edmund Clarke and Somesh Jha and Will Marrero",
  title = 	 "Using State Space Exploration and a Natural Deduction Style Message Derivation Engine to Verify Security Protocols",
  booktitle = 	 "Proceedings, {IFIP} Working Conference on Programming Concepts and Methods (\textsc{Procomet})",
  year =	 1998
}

Article{
  tag = "CokerEtAl10",
  author = 	 "George Coker and Joshua Guttman and Peter Loscocco and Amy Herzog and Jonathan Millen and Brian O'Hanlon and John Ramsdell and Ariel Segall and Justin Sheehy and Brian Sniffen", 
  title = 	 "Principles of Remote Attestation",
  journal = 	 "International Journal of Information Security",
  year = 	 2010,
  note = 	 "Forthcoming"}

Article{
  tag = "ComonCortier04",
  author = 	 "Hubert Comon and V\'{e}ronique Cortier",
  title = 	 "Security properties: two agents are sufficient",
  journal = 	 "Science of Computer Programming",
  year = 	 2004,
  volume =	 50,
  number =	 "1-3",
  pages =	 "51--71",
  month =	 "March"
}
                  

Article{
  tag = "CortierDelaune07",
  	address =	"New Delhi, India",
  	author =	"V{\'e}ronique Cortier and J{\'e}r{\'e}mie Delaitre and St{\'e}phanie Delaune",
  	booktitle =	"{P}roceedings of the 27th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'07)",
  	editor =	"Arvind, V. and Prasad, Sanjiva",
  	month =	dec,
  	publisher =	"Springer",
  	series =	"LNCS",
  	title =	"Safely Composing Security Protocols",
  	url =	"\url{http://www.lsv.ens-cachan.fr/Publis/PAPERS/PDF/CDD-fsttcs07.pdf}",
  	year =	2007,
}

Article{
  tag = "Coppersmith89",
  author = 	 "D. Coppersmith",
  title = 	 "Analysis of {ISO/CCITT} Document {X.509} Annex {D}",
  institution =  "IBM Research Division",
  year = 	 1989,
  address =	 "Yorktown Heights",
  month =	 jun
}

Article{
  tag = "Coppersmith94",
  author = 	 "D. Coppersmith",
  title = 	 "The Data Encryption Standard (DES) and its strength against attacks",
  journal =	 "IBM Journal of Research and Development",
  year =	 1994,
  volume =	 38,
  number =	 3,
  pages =	 "243--250",
  month =	 "May"
}

Article{
  tag = "CorinEtAl07",
  author    = "Ricardo Corin and Pierre-Malo Deni{\'e}lou and C{\'e}dric Fournet and Karthikeyan Bhargavan and James J. Leifer",
  title     = "Secure Implementations for Typed Session Abstractions",
  booktitle = "20th IEEE Computer Security Foundations Symposium {CSF}",
  year      = 2007,
  pages     = "170-186",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}


Article{
  tag = "BhargavanEtAl09",
  author    = "Karthikeyan Bhargavan and Ricardo Corin and Pierre-Malo Deni{\'e}lou and C{\'e}dric Fournet and James J. Leifer",
  title     = "Cryptographic Protocol Synthesis and Verification for Multiparty Sessions",
  booktitle = "IEEE Computer Security Foundations Symposium",
  year      = 2009
}


Article{
  tag = "CrazzolaraMilicia02",
  author = 	 "Federico Crazzolara and Giuseppe Milicia",
  title = 	 "Developing Security Protocols in $\chi$-Spaces",
  booktitle =	 "Proceedings, 7th Nordic Workshop on Secure {IT} Systems",
  year =	 2002,
  address =	 "Karlstad, Sweden",
  month =	 "November"
}

Article{
  tag = "CrazzolaraWinskel01",
  author = 	 "Federico Crazzolara and Glynn Winskel",
  title = 	 "Events in Security Protocols",
  booktitle =	 "Proceedings, 8th {ACM} Conference on Computer and Communications Security",
  pages =	 "96--105",
  year =	 2001,
  address =	 "Philadelphia",
  month =	 "November",
  publisher =	 "{ACM} Press"
}

Article{
  tag = "CrazzolaraWinskel02",
  author = 	 "Federico Crazzolara and Glynn Winskel",
  title = 	 "Composing Strand Spaces",
  booktitle =	 "Proceedings, Foundations of Software Technology and Theoretical Computer Science",
  pages =	 "97--108",
  year =	 2002,
  number =	 2556,
  series =	 "LNCS",
  address =	 "Kanpur",
  month =	 "December",
  publisher =	 "Springer Verlag"
}
                  
Article{
  tag = "Cremers06",
  Author    = "C.J.F. Cremers",
  Title     = "Scyther - Semantics and Verification of Security Protocols",
  School    = "Eindhoven University of Technology",
  Publisher = "University Press Eindhoven",
  Year      = 2006,
  Type      = "{Ph.D.} dissertation",
  ISBN      = "978-90-386-0804-4",
}


Article{
  tag = "Cremers2008",
 author = "Cas J.F. Cremers",
 title = "Unbounded verification, falsification, and characterization of security protocols by pattern refinement",
 booktitle = "{ACM} Conference on Computer and Communications Security ({CCS})",
 year = 2008,
 isbn = "978-1-59593-810-7",
 pages = "119--128",
 location = "Alexandria, Virginia, USA",
 doi = "http://doi.acm.org/10.1145/1455770.1455787",
 publisher = "ACM",
 address = "New York, NY, USA",
}




Article{
  tag = "Crypto93",
  title = 	 "Efficient DES Key Search",
  year = 	 1993
}

                  

Article{
  tag = "TorabiDashti07",
  author = 	 "Mohammad Torabi Dashti",
  title = 	 "Keeping Fairness Alive",
  school = 	 "Vrije Universiteit",
  year = 	 2007,
  address = 	 "Amsterdam"}

Article{
  tag = "DattaEtAl03a",
  author =       "Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic",
  title =        "Secure protocol composition",
  booktitle =    "Proceedings, Formal Methods in Security Engineering",
  editor =       "Michael Backes and David Basin and Michael Waidner",
  publisher =    "ACM",
  pages =        "11--23",
  year =         2003
}

Article{
  tag = "DattaEtAl03",
  author =       "Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic",
  title =        "A derivation system for security protocols and its logical formalization",
  booktitle =    "Proceedings, 16th Computer Security Foundations Workshop",
  editor =       "Dennis Volpano",
  publisher =    "IEEE CS Press",
  pages =        "109--125",
  year =         2003,
  url =          "ftp://ftp.kestrel.edu/pub/papers/pavlovic/CSFW03.pdf",
}



Article{
  tag = "DattaEtAl04",
  author = 	 "Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic",
  title = 	 "Abstraction and Refinement in Protocol Derivation",
  booktitle = "{IEEE} Computer Security Foundations Workshop",
  year = 	 2004,
  publisher = "{IEEE} {CS} Press"}

Article{
  tag = "DattaEtAl05",
  author = 	 "Anupam Datta and Ante Derek and John C. Mitchell and Dusko Pavlovic",
  title = 	 "A Derivation System and Compositional Logic for Security Protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 2005,
  volume =	 13,
  number =	 3,
  pages =	 "423--482"
}


Article{
  tag = "DBLP:conf/csfw/DattaDMW06",
  author    = "Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi",
  title     = "Computationally Sound Compositional Logic for Key Exchange Protocols",
  booktitle = "Computer Security Foundations Workshop",
  year      = 2006,
  pages     = "321-334",
  ee        = "http://doi.ieeecomputersociety.org/10.1109/CSFW.2006.9",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}
Article{
  tag = "DBLP:conf/csfw/2006",
  title     = "19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy",
  booktitle = "CSFW",
  publisher = "IEEE Computer Society",
  year      = 2006,
  isbn      = "0-7695-2615-2",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}

Article{
  tag = "DavisSwick90",
  author = 	 "D Davis and R Swick",
  title = 	 "Network Security via Private-Key Certificates",
  year = 	 1990,
  journal =	 "Operating Systems Review",
  pages =	 "64--67"
}

Article{
  tag = "Dedekind1888",
  title = 	 "Was Sind und Was Sollen die Zahlen?",
  author =	 "Richard Dedekind",
  address =	 "Brunschweig",
  year =	 1888,
  note =	 "Translated as ``The Nature and Meaning of Numbers,'' in Richard Dedekind, \emph{Essays on the Theory of Numbers}, New York:  Dover, 1963."
}

Article{
  tag = "Denning82",
author =       "D. E. Denning",
title =        "Cryptography and Data Security",
publisher =    "Addison Wesley",
year =         1982,
}
Article{
  tag = "DenningSacco81",
  author = 	 "Dorothy Denning and G. Sacco",
  title = 	 "Timestamps in Key Distribution Protocols",
  journal =	 "Communications of the ACM",
  year =	 1981,
  volume =	 24,
  number =	 8,
  month =	 aug
}

Article{
  tag = "DOD5200.28",
  title =	 "{Department of Defense} Trusted Computer System Evaluation Criteria",
  howpublished = "{DOD} 5200.28-{STD}",
  month =	 "December",
  year =	 1985,
  key =		 "Department of Defense"
}

Article{
  tag = "DES",
  author =       "National Bureau of Standards",
  title =        "Data Encryption Standard",
  howpublished = "Federal Information Processing Standards Publication 46",
  month =        "January",
  year =         1977
}

Article{
  tag = "DierksEtAl99",
  author = 	 "T. Dierks and C. Allen",
  title = 	 "The {TLS} Protocol",
  howpublished = "{RFC} 2246",
  month = 	 "January",
  year = 	 1999
}

Article{
  tag = "RFC2104",
  author =	 "H. Krawczyk and M. Ballare and R. Canetti",
  title =	 "{HMAC}: Keyed--Hashing for Message Authentication",
  howpublished = "{RFC} 2104",
  month =	 "February",
  year =	 1997
}

Article{
  tag = "rfc2246",
  author = 	 "T. Dierks and C. Allen",
  title = 	 "The {TLS} Protocol",
  howpublished = "{RFC} 2246",
  month = 	 "January",
  year = 	 1999
}

Article{
  tag = "Diffie88",
  author = 	 "Whitfield Diffie",
  title = 	 "The First Ten Years in Public Key Cryptography",
  journal =	 "Proceedings of the IEEE",
  year =	 1988,
  volume =	 76,
  number =	 5,
  pages =	 "560-577",
  month =	 may,
}

Article{
  tag = "DiffieHellman76",
  author = 	 "W. Diffie and M. Hellman",
  title = 	 "New Directions in Cryptography",
  journal =	 "IEEE Transactions on Information Theory",
  year = 	 1976,
  volume = 	 22,
  number =	 6,
  pages =	 "644--654",
  month = 	 nov
}

Article{
  tag = "DoghmiGuttmanThayer04",
  author = 	 "Shaddin Doghmi and Joshua Guttman and F. Javier Thayer",
  title = 	 "The Shapes of Bundles",
  institution =  "The MITRE Corp.",
  year = 	 2004,
  type =	 "MTR",
  number =	 "05 B 02"
}

Article{
  tag = "DoghmiGuttmanThayer05",
  author = 	 "Shaddin Doghmi and Joshua Guttman and F. Javier Thayer",
  title = 	 "Skeletons and the Shapes of Bundles",
  institution =  "The MITRE Corp.",
  year = 	 2005,
  type =	 "MTR",
  number =	 "05 B 02, Revision 1"
}



Article{
  tag = "DoghmiGuttmanThayer05a",
  author = 	 "Shaddin Doghmi and Joshua Guttman and F. Javier Thayer",
  title = 	 "Skeletons and the Shapes of Bundles",
  institution =  "The MITRE Corp.",
  year = 	 2005,
  note =	 "Available at \url{http://www.ccs.neu.edu/home/guttman/skeletons.pdf}"
}



Article{
  tag = "DoghmiGuttmanThayer06",
  author = 	 "Shaddin F. Doghmi and Joshua D.~Guttman and F. Javier Thayer",
  title = 	 "Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions",
  note = 	 "Submitted for publication",
  month = 	 "June",
  year = 	 2006}





Article{
  tag = "DoghmiGuttmanThayer06a",
  author = 	 "Shaddin F. Doghmi and Joshua D.~Guttman and F. Javier Thayer",
  title = 	 "Searching for Shapes in Cryptographic Protocols (Extended Version)",
  note = 	 "\url{http://eprint.iacr.org/2006/435}",
  month = 	 "November",
  year = 	 2006}

Article{
  tag = "DoghmiGuttmanThayer07a",
  author = 	 "Shaddin F. Doghmi and Joshua D.~Guttman and F. Javier Thayer",
  title = 	 "Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions",
  booktitle = "Proceedings, Mathematical Foundations of Program Semantics",
  year = 	 2007,
  editor = 	 "M. Mislove",
  series = 	 "Electronic Lecture Notes in Theoretical Computer Science",
  month = 	 "April"}



Article{
  tag = "DoghmiGuttmanThayer07",
  author = 	 "Shaddin F. Doghmi and Joshua D.~Guttman and F. Javier Thayer",
  title = 	 "Searching for Shapes in Cryptographic Protocols",
  booktitle = "Tools and Algorithms for Construction and Analysis of Systems {(TACAS)}",
  year = 	 2007,
  series = 	 "LNCS",
  number =	 4424,
  pages =	"523--538",
  formernote = 	 "Extended version at \url{http://eprint.iacr.org/2006/435}.  {CPSA} is available at \url{http://hackage.haskell.org/package/cpsa}"}

                  

Article{
  tag = "DoghmiGuttmanThayer07b",
  author = 	 "Shaddin F. Doghmi and Joshua D.~Guttman and F. Javier Thayer",
  title = 	 "Completeness of the Authentication Tests",
  booktitle =	 "European Symposium on Research in Computer Security ({ESORICS})",
  pages = 	 "106--121",
  year = 	 2007,
  editor = 	 "J. Biskup and J. Lopez",
  number = 	 4734,
  series = 	 "LNCS",
  month = 	 "September",
  publisher =	 "Springer-Verlag"}

                  

Article{
  tag = "DoghmiGuttmanThayer07c",
  author = 	 "Shaddin~F. Doghmi and Joshua~D. Guttman and F.~Javier Thayer",
  title = 	 "Skeletons and the Shapes of Bundles",
  booktitle = "Workshop on Issues in the Theory of Security ({WITS})",
  year = 	 2007,
  month = 	 "March",
  note = 	 "Workshop associated with ETAPS, Braga, Portugal"}

Article{
  tag = "DolevYao83",
  author = 	 "Daniel Dolev and Andrew Yao",
  title = 	 "On the Security of Public-Key Protocols",
  journal = 	 "{IEEE} Transactions on Information Theory",
  year = 	 1983,
  volume =	 29,
  pages =	 "198--208"
}

Article{
  tag = "DolevEvenKarp82",
  author = 	 "D. Dolev and S. Even and R. M. Karp",
  title = 	 "On the Security of Ping-Pong Protocols",
  journal = 	 "Information and Control",
  year = 	 1982,
  volume =	 55,
  pages =	 "57--68"
}

Article{
  tag = "DTOS97",
  author =       "Secure Computing Corporation",
  title =        "DTOS General System Security and Assurability Assessment Report",
  institution =  "MD A904-93-C-4209 CDRL A011",
  year =         1997,
  month =        "June",
  note =         "(http://www.securecomputing.com/randt/HTML/dtos.html)"
}

Article{
  tag = "DurginEtAl99",
  author = 	 "N. A. Durgin and P. D. Lincoln and J. C. Mitchell and A. Scedrov",
  title = 	 "Undecidability of Bounded Security Protocols",
  booktitle =	 "Proceedings of the Workshop on Formal Methods and Security Protocols --- FMSP",
  year =	 1999,
  note =	 "Final version appears in \emph{Journal of Computer Security}, 2004"
}

Article{
  tag = "DurginEtAl04a",
  author = 	 "Nancy Durgin and Patrick Lincoln and John Mitchell and Andre Scedrov",
  title = 	 "Multiset Rewriting and the Complexity of Bounded Security Protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 2004,
  volume =	 12,
  number =	 2,
  pages =	 "247--311",
  note =	 "Initial version  appeared in \emph{Workshop on Formal Methods and Security Protocols}, 1999"
}

Article{
  tag = "DurginEtAl04",
  author = 	 "Nancy Durgin and Patrick Lincoln and John Mitchell and Andre Scedrov",
  title = 	 "Multiset Rewriting and the Complexity of Bounded Security Protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 2004,
  volume =	 12,
  number =	 2,
  pages =	 "247--311",
  note =	 "Initial version  appeared in \emph{Workshop on Formal Methods and Security Protocols}, 1999"
}



Article{
  tag = "DurginEtAl00",
  author = 	 "Nancy Durgin and John C. Mitchell and Dusko Pavlovic",
  title = 	 "Protocol Composition and Correctness",
  note = 	 "Short talk delivered at \emph{Logic in Computer Science}",
  month =	 "June",
  year =	 2000
}



Article{
  tag = "DurginEtAl01",
  author = 	 "Nancy Durgin and John Mitchell and Dusko Pavlovic",
  title = 	 "A Compositional Logic for Protocol Correctness",
  booktitle = 	 "Proceedings, 14th Computer Security Foundations Workshop",
  year =	 2001,
  publisher =	 "{IEEE} Computer Society Press",
  month =	 "June"
}

Article{
  tag = "DurginEtAl03",
  author = 	 "Nancy Durgin and John Mitchell and Dusko Pavlovic",
  title = 	 "A Compositional Logic for proving security properties of protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 2003,
  volume =	 11,
  number =	 4,
  pages =	 "677--721"
}

Article{
  tag = "Eastlake99",
  author =	 "D. Eastlake",
  title =	 "Domain Name Security Extensions",
  howpublished = "{RFC} 2535",
  month =	 "March",
  year =	 1999
}

Article{
  tag = "RFC2535",
  author =	 "D. Eastlake",
  title =	 "Domain Name Security Extensions",
  howpublished = "{RFC} 2535",
  month =	 "March",
  year =	 1999
}

Article{
  tag = "Eastlake98",
  author =	 "Donald Eastlake",
  title =	 "Secret Key Establishment for {DNS}",
  howpublished = "Internet--Draft draft-ietf-dnssec-tkey-01.txt",
  month =	 "September",
  year =	 1998
}

Article{
  tag = "Eastlake98a",
  author =	 "Donald E. Eastlake",
  title =	 "Secure Domain Name System Dynamic Update",
  howpublished = "Internet--Draft draft-ietf-dnssec-update2-00.txt",
  month =	 "August",
  year =	 1998
}

Article{
  tag = "Ellison99",
  author =	 "Carl Ellison",
  title =	 "{SPKI}  Requirements",
  howpublished = "{IETF RFC} 2692",
  month =	 "September",
  year =	 1999
}

Article{
  tag = "EllisonEtAl99",
  author =	 "Carl Ellison and Bill Frantz and Butler Lampson and Ron Rivest and Brian Thomas and Tatu Ylonen",
  title =	 "{SPKI} Certificate Theory",
  howpublished = "{IETF RFC} 2693",
  month =	 "September",
  year =	 1999
}

Article{
  tag = "ElzBush97",
  author =	 "R. Elz and R.  Bush",
  title =	 "Clarifications to the {DNS} Specification",
  howpublished = "{RFC} 2182",
  month =	 "July",
  year =	 1997
}

Article{
  tag = "RFC2182",
  author =	 "R. Elz and R.  Bush",
  title =	 "Clarifications to the {DNS} Specification",
  howpublished = "{RFC} 2182",
  month =	 "July",
  year =	 1997
}

Article{
  tag = "EvenYacobi80",
  title= "Relations among public key signature systems",
  author= "Shimon Even and Yacov Yacobi",
  institution= "Computer Science Department, Technion",
  number= 175,
  year = 	 1980
}

Article{
  tag = "EvenEtAl85",
  author = 	 "Shimon Even and Oded Goldreich and Adi Shamir",
  title = 	 "On the Security of Ping-Pong Protocols when Implemented using the {RSA}",
  booktitle = 	 "Advances in Cryptology---{\sc crypto} '85",
  pages =	 "58--72", 
  year =	 1985, 
  series =	 "LNCS", 
  publisher =	 "Springer Verlag"
}
                  
Article{
  tag = "FarmerEtAl92",
    author = "William M. Farmer and Joshua D. Guttman and F. Javier Thayer",
    title = "Little theories",
    booktitle = "Automated Deduction:  CADE-11",
    number = 	 607,
    series = 	 "LNCS",
    year = 1992,
    pages = "567--581",
    publisher = "Springer-Verlag"
}





Article{
  tag = "FarmerEtAl93",
  author = 	 "William M.~Farmer and Joshua D.~Guttman and F.~Javier Thayer",
  title = 	 "{\sc imps}: An {I}nteractive {M}athematical {P}roof {S}ystem", 
  journal = 	 "Journal of Automated Reasoning",
  year = 	 1993,
  volume = 	 11,
  pages = 	 "213--248"}

Article{
  tag = "FarmerGuttman00",
  author = 	 "W. M. Farmer and J. D. Guttman",
  title = 	 "A Set Theory with Support for Partial Functions",
  journal = 	 "Studia Logica",
  year = 	 2000,
  volume = 	 65,
  pages = 	 "59--70"
}

Article{
  tag = "Failure98",
  author =       "P.A. Loscocco and S.D. Smalley and P.A. Muckelbauer and R.C. Taylor and S.J. Turner and J.F. Farrell",
  title =        "The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments",
  booktitle =    "Proceedings of the 21st National Information Systems Security Conference",
  pages =        "303--314",
  year =         1998,
  month =        "October"
}

Article{
  tag = "Feldman87",
 author =       "P. Feldman",
 title =        "A practical scheme for non-interactive verifiable secret sharing",
 booktitle =    "Proceedings of the 28th IEEE Symposium on the Foundations of Computer Science",
 pages =        "427-438",
 year =         1987,
 publisher =    "IEEE"
}

Article{
  tag = "FerraioloKuhn92",
  author =       "David Ferraiolo and Richard Kuhn",
  title =        "Role-Based Access Control",
  booktitle =    "Proceedings of the 15th National Computer Security Conference",
  year =         1992
}

Article{
  tag = "Feller",
  author = 	"W. Feller",
  title = 	"An Introduction to Probability Theory and its Applications",
  publisher = 	"John Wiley and Sons, Inc.",
  year = 	1958,
  address = 	"New York",
}

Article{
  tag = "Dudley",
  author = 	"R.  M. Dudley",
  title = 	"Real Analysis and Probability",
  publisher = 	"Wadsworth and Brookscole",
  year = 	1989,
  address = 	"Pacific Grove",
}

Article{
  tag = "FIPS",
  title =        "Security Requirements for Cryptographic Modules",
  note =         "FIPS PUB 140-1",
  author =       "Federal Information Processing Standards Publication",
  organization = "National Institue of Standards and Technology",
  note =         "US Department of Commerce",
  month =        "January",
  year =         1994
}

Article{
  tag = "FIPS4676",
title =        "Federal Information Processing Standard 46 -- the Data Encryption Standard",
year =      1976,
}

Article{
  tag = "FocardiGorrieri97",
  author = 	 "Riccardo Focardi and Roberto Gorrieri",
  title = 	 "The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties",
  journal = 	 "IEEE Transactions on Software Engineering",
  year = 	 1997,
  volume =	 23,
  number =	 9,
  month =	 "September",
  annote =    "Retrieved from http://www.cs.unibo.it/\~focardi/www/biblio2.html"
}

Article{
  tag = "DuranteFocardiGorrieri99",
  author = 	 "Antonio Durante and Riccardo Focardi and Roberto Gorrieri",
  title = 	 "{CVS}: A Compiler for the Analysis of Cryptographic Protocols",
  booktitle = 	 "12th Computer Security Foundations Workshop Proceedings",
  pages =	 "203--212",
  year =	 1999,
  month =	 "June",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "FDR2",
  author = 	 "Formal Systems (Europe) Ltd.",
  title = 	 "Failures-Divergence Refinement: {FDR}~2 User Manual",
  institution =  "Formal Systems (Europe) Ltd.",
  year = 	 1997,
  address = 	 "http: //www.formal.demon.co.uk/"
}



Article{
  tag = "FournetEtAl05",
  author = 	 "C\'{e}dric Fournet and Andrew Gordon and Sergei Maffeis",
  title = 	 "A Type Discipline for Authorization Policies",
  booktitle =	 "European Symposium on Programming",
  year =	 2005,
  editor =	 "Mooly Sagiv",
  volume =	 "LNCS No",
  series =	 "LNCS",
  publisher =	 "Springer Verlag"
}

Article{
  tag = "FrierEtAl96",
  author = 	 "Alan Frier and Philip Karlton and Paul Kocher",
  title = 	 "The {SSL} 3.0 Protocol",
  year = 	 1996,
  key =		 "draft-freier-ssl-version3-02.txt",
  howpublished = "Internet Draft",
  month =	 nov
}

Article{
  tag = "Froeschle08",
  author = "Sibylle Froschle",
  title = "Adding Branching to the Strand Space Model",
  booktitle = "Proceedings of {EXPRESS'08}",
  series = "ENTCS",
  publisher = "Elsevier",
  year = 	 2008
}

Article{
  tag = "FumyLandrock93",
  author = 	 "W. Fumy and P. Landrock",
  title = 	 "Principles of Key Management",
  journal =	 "IEEE Journal on Selected Areas in Communications",
  year =	 1993,
  pages =	 "785--793",
  month =	 jun
}

Article{
  tag = "GarayEtAl99",
 author = "Juan A. Garay and Markus Jakobsson and Philip D. MacKenzie",
 title = "Abuse-Free Optimistic Contract Signing",
 booktitle = "CRYPTO '99: Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology",
 year = 1999,
 isbn = "3-540-66347-9",
 pages = "449--466",
 publisher = "Springer-Verlag",
 address = "London, UK",
 }


Article{
  tag = "Gentzen35",
  author = 	"G. Gentzen",
  title = 	"Investigations into Logical Deduction (1935)",
  booktitle = 	"The Collected Works of Gerhard Gentzen",
  publisher = 	"North Holland",
  year = 	1969,
}

                  

Article{
  tag = "GeometricLogic",
  author = 	 "NN",
  title = 	 "Geometric Logic",
  booktitle = "Whatever volume contains it",
  year = 	 "200?"}

Article{
  tag = "GoguenMeseguer82",
  author = 	 "Joseph A. Goguen and Jose Meseguer",
  title = 	 "Security Policies and Security Models",
  booktitle =	 "{IEEE} Symposium on Security and Privacy",
  year =	 1982
}

Article{
  tag = "GoguenMeseguer92",
 author = "Joseph A. Goguen and Jos\'{e} Meseguer",
 title = "Order-sorted algebra {I}: equational deduction for multiple inheritance, overloading, exceptions and partial operations",
 journal = "Theoretical Computer Science",
 volume = "105",
 number = 2,
 year = 1992,
 pages = "217--273",
 doi = "http://dx.doi.org/10.1016/0304-3975(92)90302-V",
 publisher = "Elsevier Science Publishers Ltd.",
 address = "Essex, UK",
 }


Article{
  tag = "GongAuth",
  author =       "Li Gong",
  title =        "Increasing Availability and Security of an Authentication Service",
  journal =      "IEEE Journal on Selected Areas in Communications",
  year =         1993,
  volume =       11,
  number =       5,
  month =        jun
}

Article{
  tag = "Gong89",
  author =       "Li Gong",
  title =        "Using One-way Functions for Authentication ",
  journal =      "Computer Communication Review",
  year =         1989,
  volume =       19,
  number =       5,
  pages =        "8-11",
  month =        oct
}

Article{
  tag = "GoldwasserBellare",
  author = 	 "Shafi Goldwasser and Mihir Bellare",
  title = 	 "Lecture Notes on Cryptography",
  note = 	 "Avaliable at http://www.cs.ucsd.edu/users/mihir/papers/gb.html",
  month =	 "August",
  year =	 1999
}

Article{
  tag = "Gong90a",
  author = 	 "Li Gong",
  title = 	 "Verifiable-Text Attacks in Cryptographic Protocols",
  pages =	 "686--693",
  booktitle =	 "Proceedings {IEEE} {INFOCOM'90} ",
  year =	 1990,
  publisher =	 "IEEE Computer Society",
  month =	 jun,
}

Article{
  tag = "Gong90b",
  author = 	 "Li Gong",
  title = 	 "A Note on Redundancy in Encrypted Messages",
  journal =	 "Computer Communication Review",
  year = 	 1990,
  volume =	 20,
  number =	 5,
  pages =	 "18-22",
  month =	 oct,
}

Article{
  tag = "Gong91",
  author = 	 "Li Gong",
  title = 	 "Handling Infeasible Specifications of Cryptographic Protocols",
  pages =	 "99--102",
  booktitle =	 "Proceedings of The 4th {IEEE} Computer Security Foundations Workshop",
  year =	 1991,
  publisher =	 "IEEE Computer Society",
  month =	 jun
}

Article{
  tag = "Gong93",
  author = 	 "Li Gong",
  title = 	 "Variations on the Themes of Message Freshness and Replay and Replay or, the Difficulty of of Devising Formal Nethods to Analyse Cryptographic Protocols",
  pages =	 "131--136",
  booktitle =	 "Proceedings 6th Computer Security Foundations Workshop",
  year =	 1993,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "GongLomasNeedhamSaltzer93",
  author = 	 "Li Gong and A. Lomas and Roger M. Needham and Jerry H. Saltzer",
  title = 	 "Protecting Poorly Chosen Secrets from Guessing Attacks",
  journal =	 "IEEE Journal on Selected Areas in Communications",
  year =	 1993,
  volume =	 11,
  number =	 5,
  month =	 jun
}

Article{
  tag = "GongNeedhamYahalom90",
  author = 	 "Li Gong and Roger Needham and Raphael Yahalom",
  title = 	 "Reasoning About Belief in Cryptographic Protocols",
  editor =	 "Deborah Cooper and Teresa Lunt",
  pages =	 "234--248",
  booktitle =	 "Proceedings 1990 IEEE Symposium on Research in Security and Privacy",
  year =	 1990,
  publisher =	 "IEEE Computer Society",
  month =	 may
}

Article{
  tag = "GongSyverson95",
  author = 	 "Li Gong and Paul Syverson",
  title = 	 "Fail-Stop Protocols: An Approach to Designing Secure Protocols",
  booktitle = 	 "5th International Working Conference on Dependable Computing for Critical Applications",
  pages =	 "44--55",
  year =	 1995,
  month =	 "September"
}

Article{
  tag = "Gordon84",
  title = 	 "Public Key Cryptosystems",
  author =       "John Gordon",
  booktitle =	 "Proceedings of Networks '84",
  year = 	 1984
}

Article{
  tag = "GordonJeffrey01a",
  author = 	 "Andrew D. Gordon and Alan Jeffrey",
  title = 	 "Authentication by Typing",
  booktitle = 	 "Proceedings, 14th Computer Security Foundations Workshop",
  year =	 2001,
  month =	 "June",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "GordonJeffrey02",
  author = 	 "Andrew D. Gordon and Alan Jeffrey",
  title = 	 "Types and Effects for Asymmetric Cryptographic Protocols",
  booktitle = 	 "Proceedings, 15th Computer Security Foundations Workshop",
  year =	 2002,
  month =	 "June",
  publisher =	 "{IEEE} Computer Society Press"
}



Article{
  tag = "GordonJeffrey03",
  author = 	 "Andrew D. Gordon and Alan Jeffrey",
  title = 	 "Authenticity by typing for security protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 2003,
  volume = 	 11,
  number = 	 4,
  pages = 	 "451-–521"}



Article{
  tag = "GordonJeffrey03a",
  author = 	 "Andrew D. Gordon and Alan Jeffrey",
  title = 	 "Types and effects for asymmetric cryptographic protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 2003,
  volume = 	 12,
  number = 	 "3/4",
  pages = 	 "435–-484"}


Article{
  tag = "GoubaultLarrecq08",
  author    = "Jean Goubault-Larrecq",
  title     = "Towards Producing Formally Checkable Security Proofs, Automatically",
  booktitle = "Computer Security Foundations Workshop",
  year      = 2008,
  pages     = "224-238",
  ee        = "http://doi.ieeecomputersociety.org/10.1109/CSF.2008.21",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}
                 



Article{
  tag = "VLispIntro95",
  author = 	 "Joshua~D. Guttman and John~D. Ramsdell and Mitchell Wand",
  title = 	 "{VLISP}: A verified implementation of {Scheme}",
  journal = 	 "Lisp and Symbolic Computation",
  year = 	 1995,
  volume = 	 8,
  number = 	 "1/2",
  pages = 	 "5--32"}

                  

Article{
  tag = "VLispScheme95",
  author = 	 "Joshua~D. Guttman and John~D. Ramsdell and Vipin Swarup",
  title = 	 "The {VLISP} verified {Scheme} system",
  journal = 	 "Lisp and Symbolic Computation",
  year = 	 1995,
  volume = 	 8,
  number = 	 "1/2",
  pages = 	 "33--110"}

Article{
  tag = "Guttman96",
        AUTHOR = "Joshua D. Guttman",
        TITLE = "Filtering Postures: Local Enforcement for Global Policies",
        NUMBER = "MTR 97B0000007",
        INSTITUTION = "The MITRE Corporation, Center for Integrated Intelligence Systems",
        ADDRESS = "Bedford, Massachusets",
        MONTH = "November",
        YEAR = 1996 }

Article{
  tag = "Guttman97",
  author = 	 "Joshua D. Guttman",
  title = 	 "Filtering Postures:  Local Enforcement for Global Policies",
  booktitle = 	 "Proceedings, 1997 {IEEE} Symposium on Security and Privacy",
  pages =	 "120--29",
  year =	 1997,
  month =	 "May",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "Guttman99",
  author = 	 "Joshua D. Guttman",
  title = 	 "Packet Filters and their Atoms",
  note = 	 "Lecture at University of Pennsylvania, host C.~Gunter",
  month =	 "April",
  year =	 1999
}

Article{
  tag = "Guttman01",
  author = 	 "Joshua D. Guttman",
  title = 	 "Security Goals: Packet Trajectories and Strand Spaces",
  booktitle = 	 "Foundations of Security Analysis and Design",
  publisher =	 "Springer Verlag",
  year =	 2001,
  editor =	 "Roberto Gorrieri and Riccardo Focardi",
  volume =	 2171,
  series =	 "LNCS",
  pages =	 "197--261",
}

Article{
  tag = "Guttman01a",
  author = 	 "Joshua D. Guttman",
  title = 	 "Key Compromise and the Authentication Tests",
  journal = 	 "Electronic Notes in Theoretical Computer Science",
  year = 	 2001,
  volume =	 47,
  note =	 "Editor, M. Mislove.  URL~\url{http://www.elsevier.nl/locate/entcs/volume47.html}, 21 pages"
}

Article{
  tag = "Guttman02",
  author = 	 "Joshua D. Guttman",
  title = 	 "Security Protocol Design via Authentication Tests",
  booktitle =	 "Proceedings, 15th Computer Security Foundations Workshop",
  year =	 2002,
  month =	 "June",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "Guttman04",
  author = 	 "Joshua D. Guttman",
  title = 	 "Authentication Tests and Disjoint Encryption: a Design Method for Security Protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 2004,
  volume =	 12,
  number =	 "3/4",
  pages =	 "409--433"
}

Article{
  tag = "Guttman04old",
  author = 	 "Joshua D. Guttman",
  title = 	 "Authentication Tests and Disjoint Encryption: a Design Method for Security Protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 2004,
  volume =	 12,
  number =	 "3/4",
  note =	"Extended version of ``Security Protocol Design via Authentication Tests,'' CSFW 2002.", 
  pages =	 "409--433"
}



Article{
  tag = "Guttman04a",
  author = 	 "Joshua D. Guttman",
  title = 	 "Security, Protocols, and Trust",
  booktitle =	 "VMCAI 2004:  Verification, Model Checking, and Abstract Interpretation",
  year =	 2004,
  editor =	 "G. Levi and B. Steffen",
  volume =	 2937,
  series =	 "LNCS",
  publisher =	 "Springer Verlag",
  note =	 "(abstract of tutorial)"
}



Article{
  tag = "Guttman08",
  author = 	 "Joshua D. Guttman",
  title = 	 "Cryptographic Protocol Composition, via the Authentication Tests",
  note = 	 "Submitted for publication",
  month = 	 "January",
  year = 	 2008}



Article{
  tag = "Guttman09",
  author = 	 "Joshua D. Guttman",
  title = 	 "Cryptographic Protocol Composition via the Authentication Tests",
  booktitle = "Foundations of Software Science and Computation Structures ({FOSSACS})",
  year = 	 2009,
  editor = 	 "Luca de Alfaro",
  series = 	 "LNCS",
  number = 	 5504,
  pages = 	 "303--317",
  publisher = "Springer"}

Article{
  tag = "Guttman09a",
  author = 	 "Joshua D. Guttman",
  title = 	 "Transformations between Cryptographic Protocols",
  booktitle = "Automated Reasoning in Security Protocol Analysis, and Workshop on Issues in the Theory of Security ({ARSPA-WITS})",
  year = 	 2009,
  pages = 	 "107--123",
  number = 	 5511,
  editor = 	 "P. Degano and L. Vigan{\`o}",
  series = 	 "LNCS",
  publisher = "Springer"}
                  
                  


Article{
  tag = "Guttman09b",
  author = 	 "Joshua D. Guttman",
  title = 	 "Fair Exchange in Strand Spaces",
  booktitle = "SecCo: 7th International Workshop on Security Issues in Concurrency",
  year = 	 2009,
  editor = 	 "M. Boreale and S. Kremer",
  series = 	 "EPTCS",
  month = 	 "Sep",
  publisher = "Electronic Proceedings in Theoretical Computer Science"}
                  
Article{
  tag = "Guttman09c",
  author = "Joshua D. Guttman",
  title = "Security Theorems via Model Theory",
  journal = "EXPRESS:  Expressiveness in Concurrency (EPTCS)",
  volume = "8",
  pages = "51",
  url = "http://cgi.cse.unsw.edu.au/~rvg/eptcs/content.cgi?EXPRESS2009", 
  note = "doi:10.4204/EPTCS.8.5",
  year = 2009
}






Article{
  tag = "CortierKremer2011",
  editor = 	 "Veronique Cortier and Steve Kremer",
  title = 	 "Formal Models and Techniques for Analyzing Security Protocols",
  publisher = 	 "IOS Press",
  year = 	 2011,
  series = 	 "Cryptology and Information Security Series"}


Article{
  tag = "Guttman10",
  author = 	 "Joshua D. Guttman",
  title = 	 "Shapes: Surveying Crypto Protocol Runs",
  booktitle = 	 "Formal Models and Techniques for Analyzing Security Protocols",
  key = 	 "CortierKremer2011", 
  publisher = "{IOS} Press",
  year = 	 2011,
  editor = 	 "Veronique Cortier and Steve Kremer",
  series = 	 "Cryptology and Information Security Series"}

Article{
  tag = "GuttmanEtAl00",
  author = 	 "Joshua Guttman and Amy L. Herzog and F. Javier Thayer",
  booktitle =    "Proceedings, ESORICS 2000",
  pages =        "255-272",
  year =         2000,
  month =        "October",
  publisher =    "Springer",
  number =	 1895, 
  series = 	 "LNCS"
}

Article{
  tag = "GuttmanHerzog02",
  author =       "Joshua D. Guttman and Amy L. Herzog",
  title =        "Eager Formal Methods for Security Management",
  booktitle =    "Proceedings, VERIFY '02",
  pages =        "91--101",
  year =         2002,
  month =        "July"
}

Article{
  tag = "GuttmanHerzog05",
  author = 	 "Joshua D. Guttman and Amy L. Herzog",
  title = 	 "Rigorous Automated Network Security Management",
  journal = 	 "International Journal for Information Security",
  year = 	 2005,
  volume =	 5,
  number =	 "1--2",
  pages =	 "29--48"
}

Article{
  tag = "GuttmanHerzog03",
  author = 	 "Joshua D. Guttman and Amy L. Herzog",
  title = 	 "Rigorous Automated Network Security Management",
  journal = 	 "International Journal for Information Security",
  year = 	 2004,
  note =	 "Forthcoming"
}

Article{
  tag = "GuttmanHerzogRamsdell03",
  author =	 "Joshua D. Guttman and Amy L. Herzog and John D. Ramsdell",
  title =	 "Information Flow in Operating Systems: Eager Formal Methods",
  howpublished = "Submitted for publication",
  month =	 "January",
  year =	 2003
}


Article{
  tag = "GuttmanHerzogRamsdell04",
  author = 	 "Joshua D. Guttman and Amy L. Herzog and John D. Ramsdell and Clement W. Skorupka",
  title = 	 "Verifying Information Flow Goals in {Security-Enhanced Linux}",
  journal = 	 "Journal of Computer Security",
  year = 	 2005,
  volume = 	 13,
  number = 	 1,
  pages = 	 "115--134",
  note = 	 "Preliminary version appeared in the Workshop on Issues in the Theory of Security (IFIP WG 1.7), April 2003."
}



Article{
  tag = "GuttmanHerzogThayer00ab",
  author = 	 "Joshua D. Guttman and Amy L. Herzog and F. Javier Thayer",
  title = 	 "Authentication and Confidentiality via {IPsec}",
  institution =  "The {MITRE} Corporation",
  year = 	 2000,
  month =	 "March"
}

Article{
  tag = "GuttmanHerzogThayer00",
  author = 	 "Joshua D. Guttman and Amy L. Herzog and F. Javier Thayer",
  title = 	 "Authentication and Confidentiality via {IPsec}",
  booktitle = 	 "ESORICS 2000: European Symposium on Research in Computer Security",
  year =	 2000,
  number =	 1895,
  editor =	 "D. Gollman",
  series =	 "LNCS",
  publisher =	 "Springer Verlag"
}



Article{
  tag = "GuttmanEtAl05",
  author = 	 "Joshua D. Guttman and Jonathan C. Herzog and John D. Ramsdell and Brian T. Sniffen",
  title = 	 "Programming Cryptographic Protocols",
  booktitle =	 "Trust in Global Computing",
  pages =	 "116--145",
  year =	 2005,
  editor =	 "Rocco De Nicola and Davide Sangiorgi",
  number =	 3705,
  series =	 "LNCS",
  publisher =	 "Springer"
}

Article{
  tag = "GuttmanThayer99",
  author = 	 "Joshua D. Guttman and F. Javier {\textsc{Thayer} F\'abrega}",
  title = 	 "Disjoint Encryption and the Normal Penetrator",
  note = 	 "Unpublished",
  month =	 "September",
  year =	 1999
}

Article{
  tag = "GuttmanThayer00",
  author = 	 "Joshua D. Guttman and F. Javier {Thayer}",
  title = 	 "Authentication Tests",
  booktitle = 	 "Proceedings, 2000 IEEE Symposium on Security and Privacy",
  year =	 2000,
  organization = "May",
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "GuttmanThayer00a",
  author = 	 "Joshua D. Guttman and F. Javier {\textsc{Thayer} F{\'a}brega}",
  title = 	 "Authentication Tests and the Normal Penetrator",
  institution =  "The {MITRE} Corporation",
  year = 	 2000,
  type =	 "MTR",
  number =	 "00B04",
  month =	 "February",
  note =	 "Also submitted for publication.{\typeout{ERROR:  Don't cite this anymore, use GuttmanThayer00c.}}"
}

Article{
  tag = "GuttmanThayer00caca",
  author = 	 "Joshua D. Guttman and F. Javier {\textsc{Thayer} F{\'a}brega}",
  title = 	 "Authentication Tests and the Structure of Bundles",
  journal = 	 "Theoretical Computer Science",
  year = 	 2002,
  note =	 "To appear"
}

Article{
  tag = "GuttmanThayer00c",
  author = 	 "Joshua D. Guttman and F. Javier {{Thayer}}",
  title = 	 "Authentication Tests and the Structure of Bundles",
  journal = 	 "Theoretical Computer Science",
  year = 	 2002,
  month =        "June",
  pages =        "333--380",
  volume =	 283,
  number =	 2
}

Article{
  tag = "GuttmanThayer02",
  author = 	 "Joshua D. Guttman and F. Javier {{Thayer}}",
  title = 	 "Authentication Tests and the Structure of Bundles",
  journal = 	 "Theoretical Computer Science",
  year = 	 2002,
  month =        "June",
  pages =        "333--380",
  volume =	 283,
  number =	 2, 
  note =	 "Conference version appeared in \emph{IEEE Symposium on Security and Privacy}, May 2000."
}

Article{
  tag = "GuttmanThayer00b",
  author = 	 "Joshua D. Guttman and F. Javier {{Thayer}}",
  title = 	 "Protocol Independence through Disjoint Encryption",
  booktitle = 	 "Computer Security Foundations Workshop",
  year =	 2000,
  publisher =	 "{IEEE} {CS} Press"
}

Article{
  tag = "GuttmanThayer00ba",
  author = 	 "Joshua D. Guttman and F. Javier {\textsc{Thayer} F{\'a}brega}",
  title = 	 "Protocol Independence through Disjoint Encryption",
  note = 	 "In preparation.",
}

Article{
  tag = "GuttmanThayer05",
  author = 	 "Joshua D. Guttman and F. Javier Thayer",
  title = 	 "The Sizes of Skeletons:  Decidable Cryptographic Protocol Authentication and Secrecy Goals",
  institution =  "The MITRE Corporation",
  year = 	 2005,
  type =	 "MTR",
  number =	 "05B09 Revision~1",
  month =	 "March"
}


Article{
  tag = "GuttmanThayer05a",
  author = 	 "Joshua D. Guttman and F. Javier Thayer",
  title = 	 "Protocol Security Goals and the Size of Skeletons",
  institution =  "The MITRE Corp.",
  year = 	 2005,
  note =	 "Available at \url{http://www.ccs.neu.edu/home/guttman/sizes_of_skeletons.pdf}, submitted for publication"
}


Article{
  tag = "GuttmanThayerZuck01",
  author = 	 "Joshua D. Guttman and F. Javier Thayer and Lenore D. Zuck",
  title = 	 "The Faithfulness of Abstract Protocol Analysis:  Message Authentication",
  booktitle = 	 "Proceedings, Eighth ACM Conference on Computer and Communications Security",
  year =	 2001,
  month =	 "November",
  organization = "{ACM}"
}

Article{
  tag = "GuttmanEtAl04",
  author = 	 "Joshua D. {Guttman} and F. Javier Thayer and Jay A. Carlson and Jonathan C. Herzog and John D. Ramsdell and Brian T. Sniffen",
  title = 	 "Trust Management in Strand Spaces: A Rely-Guarantee Method",
  booktitle =	 "Programming Languages and Systems: 13th European Symposium on Programming",
  pages =	 "325--339",
  year =	 2004,
  editor =	 "David Schmidt",
  number =	 2986,
  series =	 "LNCS",
  publisher =	 "Springer"
}

Article{
  tag = "GuttmanThayerZuck03",
  author = 	 "Joshua D. Guttman and F. Javier Thayer and Lenore D. Zuck",
  title = 	 "The Faithfulness of Abstract Protocol Analysis:  Message Authentication",
  journal = 	 "Journal of Computer Security",
  year = 	 2004,
  volume =	 12,
  number =	 6,
  pages =	 "865--891"
}


Article{
  tag = "GuttmanThayerZuck04",
  author = 	 "Joshua D. Guttman and F. Javier Thayer and Lenore D. Zuck",
  title = 	 "The Faithfulness of Abstract Protocol Analysis:  Message Authentication",
  journal = 	 "Journal of Computer Security",
  year = 	 2004,
  volume =	 12,
  number =	 6,
  pages =	 "865--891"
}

Article{
  tag = "DBLP:conf/ifip1-7/2008",
  editor    = "Pierpaolo Degano and Joshua D. Guttman and Fabio Martinelli",
  title     = "Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers",
  booktitle = "Formal Aspects in Security and Trust",
  publisher = "Springer",
  series    = "LNCS",
  volume    = "5491",
  year      = 2009,
  ee        = "http://dx.doi.org/10.1007/978-3-642-01465-9",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}

Article{
  tag = "Halpern95",
  author = 	 "Joseph Y. Halpern",
  title = 	 "Reasoning about Knowledge:  A Survey",
  booktitle = 	 "Handbook of Logic in Artificial Intelligence and Logic Programming",
  pages =	 "1--34",
  publisher =	 "Oxford University Press",
  year =	 1995,
  editor =	 "D. Gabbay and C. J. Hogger and J. A Robinson",
  volume =	 4
}

Article{
  tag = "HalpernvanderMeyden01",
  author = 	 "Joseph Y. Halpern and Ron {van der Meyden}",
  title = 	 "A Logic for {SDSI}'s Linked Local Name Spaces",
  journal = 	 "Journal of Computer Security",
  year = 	 2001,
  volume =	 9,
  number =	 "1--2",
  pages =	 "47--74"
}

Article{
  tag = "HalpernEtAl95",
  author =	 "Ronald Fagin and Joseph Y. Halpern and Yoram Moses and Moshe Y. Vardi",
  title = 	 "Reasoning about Knowledge",
  publisher = 	 "{MIT} Press",
  year = 	 1995,
  address =	 "Cambridge, MA"
}

Article{
  tag = "HalpernPucella03",
  author = 	 "Joseph Y. Halpern and Riccardo Pucella",
  title = 	 "On the Relationship between Strand Spaces and Multi-Agent Systems",
  journal = 	 "{ACM} Transactions on Information and System Security",
  year = 	 2003,
  volume =	 6,
  number =	 1,
  pages =	 "43--70",
  month =	 "February"
}

Article{
  tag = "HauserJansenMolvaTsudikHerreweghen94",
  author = 	 "R. Hauser and P. Jansen and R. Molva and G. Tsudik and E. van Herreweghen",
  title = 	 "Robust and Secure Pasword and Key Change Method",
  editor =	 "Dieter Gollmann",
  number =	 875,
  series =	 "LNCS",
  pages =	 "107--122",
  booktitle =	 "Computer Security---{ESORICS} '94",
  year =	 1994,
  publisher =	 "Springer"
}

Article{
  tag = "HeatherEtAl00",
  author = 	 "James Heather and Gavin Lowe and Steve Schneider",
  title = 	 "How to Prevent Type Flaw Attacks on Security Protocols",
  booktitle = 	 "Proceedings, 13th Computer Security Foundations Workshop",
  year =	 2000,
  month =	 "July",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "HeatherSchneider00",
  author = 	 "James Heather and Steve Schneider",
  title = 	 "Toward Automatic Verification of Authentication Protocols on an Unbounded Network",
  booktitle = 	 "Proceedings, 13th Computer Security Foundations Workshop",
  year =	 2000,
  month =	 "July",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "HeatherSchneider05", 
  author =       "James A. Heather and Steve A. Schneider",
  title =        "A Decision Procedure for the Existence of a Rank Function",
  journal =      "Journal of Computer Security",
  year =         2005,
  note =         "Forthcoming."
}




Article{
  tag = "HeatherSchneider05a",
  author = 	 "James A. Heather and Steve A. Schneider",
  title = 	 "Infinite/Finite ???",
  note = 	 "Submitted for publication",
  month =	 "April",
  year =	 2005
}

Article{
  tag = "Hellman79",
  author = 	 "Martin E Hellman",
  title = 	 "The Mathematics of Public Key Cryptography",
  journal =	 "Scientific American",
  year =	 1979,
  pages =	 "130-139",
  month =	 aug
}

Article{
  tag = "HerzogGuttman02",
  author = 	 "Amy L. Herzog and Joshua D. Guttman",
  title = 	 "Security Goal Achievement In A Heterogeneous Environment",
  institution =  "The MITRE Corporation",
  year = 	 2002
}

Article{
  tag = "HerzogEtAl98",
  author = 	 "Jonathan Herzog and Joshua Guttman and Fred Chase",
  title = 	 "A Strand Space Analysis of the {SSH} Version 2 Protocol",
  note = 	 "{MITRE} Product {MP} 98B0000056",
  month =        "September",
  year =	 1998
}

Article{
  tag = "HerzogEtAl99",
  author = 	 "Jonathan Herzog and Fred Chase and Joshua Guttman",
  title = 	 "A Saying-Logic Analysis of core {DNS} Security",
  note = 	 "{MITRE} Product {MP} 99{B}0000039",
  year =	 1999
}

Article{
  tag = "Herzog00",
  author = 	 "Jonathan Herzog",
  title = 	 "Some Security Concerns Regarding {PPP}--{EAP}--{TLS}",
  note = 	 "{MITRE} Product {MP} 00{B}0000019",
  year =	 2000
}

Article{
  tag = "HerzogEtAl00",
  author = 	 "Jonathan Herzog and Laura Feinstein and Joshua Guttman",
  title = 	 "A Strand Space Analysis of {TLS} 1.0",
  note = 	 "{MITRE} Document {MTR} 0{B}0000011",
  year =	 2000
}

Article{
  tag = "Herzog00b",
  author = 	 "Jonathan Herzog",
  title = 	 "Mobile {IP} Security",
  note = 	 "{MITRE} Product {MP} 00{B}0000063",
  year =	 2000
}

Article{
  tag = "Herzog02",
  author = 	 "Jonathan Herzog",
  title = 	 "Computational Soundness of Formal Adversaries",
  school = 	 "Massachusetts Institute of Technology",
  year = 	 2002
}

Article{
  tag = "Herzog03",
  author = 	 "Jonathan C. Herzog",
  title = 	 "The {Diffie-Hellman} Key-Agreement Scheme in the Strand-Space Model",
  booktitle =	 "16th Computer Security Foundations Workshop",
  pages =	 "234--247",
  year =	 2003,
  address =	 "Asilomar, CA",
  month =	 "June",
  publisher =	 "{IEEE CS} Press"
}

Article{
  tag = "HerzogEtAl04",
  author = 	 "Jonathan Herzog and Brian Sniffen and Jay Carlson and Joshua D. Guttman and John D. Ramsdell",
  title = 	 "Trust Management with Cryptographic Hardware Assistance",
  institution =  "The MITRE Corp.",
  year = 	 2003,
  type =	 "MTR",
  number =	 "03B0082",
  address =	 "Bedford, MA",
  month =	 "September"
}

Article{
  tag = "Herzog04",
  author = 	 "Jonathan Herzog",
  title = 	 "Computational Soundess for Standard Assumption of Formal Cryptography",
  school = 	 "Massachusetts Institute of Technology",
  year = 	 2004
}

Article{
  tag = "Hoare78",
  author = 	 "C. A. R. Hoare",
  title = 	 "Communicating Sequential Processes",
  journal = 	 "CACM",
  year = 	 1978,
  volume =	 21,
  number =	 8,
  pages =	 "666--77"
}

Article{
  tag = "Hoare85",
  author = 	"C. A. R. Hoare",
  title = 	"Communicating Sequential Processes",
  publisher = 	"Prentice-Hall International",
  year = 	1985,
  address = 	"Englewood Cliffs, New Jersey",
  patron =	"Guttman"
}

Article{
  tag = "Holzmann91",
  author = 	 "Gerard Holzmann",
  title = 	 "Design and Validation of Computer Protocols",
  publisher = 	 "Prentice Hall",
  year = 	 1991
}

Article{
  tag = "HouselyEtAl99",
  author =	 "R. Housley and W. Ford and W. Polk and D. Solo",
  title =	 "Internet {X.509} Public Key Infrastructure Certificate and {CRL} Profile",
  howpublished = "{RFC} 2459",
  month =	 "January",
  year =	 1999
}


Article{
  tag = "RFC2459",
  author =	 "R. Housley and W. Ford and W. Polk and D. Solo",
  title =	 "Internet X.509 Public Key Infrastructure Certificate and CRL Profile",
  howpublished = "{RFC} 2459",
  month =	 "January",
  year =	 1999
}

Article{
  tag = "RFC3280",
  author =	 "R. Housley and W. Polk and W. Ford and D. Solo",
  title =	 "Internet X.509 Public Key Infrastructure Certificate and CRL Profile",
  howpublished = "{RFC} 3280",
  month =	 "April",
  year =	 2002
}

Article{
  tag = "HuiLowe99",
  author = 	 "Mei Lin Hui and Gavin Lowe",
  title = 	 "Safe Simplifying Transformations for Security Protocols",
  booktitle = 	 "12th Computer Security Foundations Workshop Proceedings",
  year =	 1999,
  publisher =	 "{IEEE} Computer Society Press",
  pages =	 "32--43",
  month = 	 "June"
}

Article{
  tag = "HuiLowe01",
  author    = "Mei Lin Hui and Gavin Lowe",
  title     = "Fault-Preserving Simplifying Transformations for Security Protocols",
  journal   = "Journal of Computer Security",
  volume    = 9,
  number    = "1/2",
  year      = 2001,
  pages     = "3-46",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}


Article{
  tag = "HwangChen95",
   author =       "Tzonelih Hwang and Yung-Hsiang Chen",
   title =        "On the security of {SPLICE/AS}: The authentication system in {WIDE Internet}",
   journal =      "Information Processing Letters",
    year =         1995,
    volume =       53,
    pages =        "97--101"
}

Article{
  tag = "HwangLeeLiKoChen95",
  author = 	 "Tzonelih Hwang and Narn-Yoh Lee and Chuang-Ming Li and Ming-Yung Ko and Yung-Hsiang Chen",
  title = 	 "Two Attacks on {Neuman-Stubblebine} Authentication Protocols",
  journal =	 "Information Processing Letters",
  year =	 1995,
  volume =	 53,
  pages =	 "103--107"
}

Article{
  tag = "Integrating01",
  author =       "P. Loscocco and S. Smalley",
  title =        "Integrating Flexible Support for Security Policies into the {Linux} Operating System",
  booktitle =    "Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference",
  year =         2001
}



Article{
  tag = "ikev2:id:17",
  author =	 "Charlie {Kaufman, ed.}",
  title =	 "Internet Key Exchange ({IKEv2}) Protocol",
  howpublished = "Internet Draft",
  month =	 "September",
  year =	 2004,
  note =	 "Available at \url{http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ikev2-17.txt}"
}

Article{
  tag = "IPchains00",
  key =		 "IPchains00",
  author =	 "Rusty Russell",
  title =	 "Linux IP Firewalling Chains",
  howpublished = "Linux Howto",
  month =	 "October",
  year =	 2000,
  note =	 "URL~\url{http://www.netfilter.org/ipchains/}"
}

Article{
  tag = "IPfilter00",
  key =		 "IPfilter00",
  author =	 "Darren Reed",
  title =	 "IP Filter",
  howpublished = "Download Web Page",
  month =	 "December",
  year =	 2002,
  note =	 "URL~\url{http://coombs.anu.edu.au/~avalon/}"
}

Article{
  tag = "ISOIEC9798-1",
  title = 	 "Information Technology - Security techniques --- Entity Authentication Mechanisms Part 1: General Model",
  organization = "ISO/IEC",
  year =	 1991
}

Article{
  tag = "ISOIECDIS9798-2",
  title = 	 "Information Technology - Security techniques --- Entity Authentication Mechanisms Part 2: Entity authentication using symmetric techniques",
  organization = "ISO/IEC",
  year =	 1993
}

Article{
  tag = "ISOIECDIS9798-3",
  title = 	 "Information Technology - Security techniques --- Entity Authentication Mechanisms Part 3: Entity authentication using a public key algorithm",
  organization = "ISO/IEC",
  year =	 1993
}



Article{
  tag = "ITUMSC99",
  author = 	 "ITU",
  title = 	 "Message Sequence Chart ({MSC})",
  howpublished = "Recommendation Z.120",
  year = 	 1999}

Article{
  tag = "ITTCweb",
  author =       "D. Boneh and T. Raj and M. Malkin and T. Wu",
  title =        "Intrustion Tolerance via Threshold Cryptography",
  note =         "http://crypto.stanford.edu/\~dabo/ITTC"
}

Article{
  tag = "JiwaSeberryZheng94",
  author = 	 "A Jiwa and J Seberry and Y Zheng",
  title = 	 "Beacon Based Authentication",
  editor =	 "Dieter Gollmann",
  number =	 875,
  series =	 "LNCS",
  pages =	 "125--142",
  booktitle =	 "Computer Security --- {ESORICS} '94",
  year =	 1994,
  publisher =	 "Springer"
}

Article{
  tag = "Jones83",
  author = 	 "Cliff B. Jones",
  title = 	 "Tentative Steps toward a Development Method for Interfering Programs",
  journal = 	 "{ACM} Transactions on Programming Languages and Systems",
  year = 	 1983,
  volume = 	 "5",
  number = 	 4,
  pages = 	 "596--619",
}

Article{
  tag = "JurjensWimmel01",
  author = "Jan {J{u}rjens} and Guido Wimmel",
  title = 	 "Specification-Based Testing of Firewalls",
  note = 	 "Submitted for publication",
  year = 	 2001,
}

Article{
  tag = "KailarGligor91",
  author = 	 "R. Kailar and Virgil D. Gligor",
  title = 	 "On Belief Evolution in Authentication Protocols",
  pages =	 "103--116",
  booktitle =	 "Proceedings of the Computer Security Foundations Workshop IV",
  year =	 1991,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "DBLP:journals/joc/KatzY07",
  author    = "Jonathan Katz and Moti Yung",
  title     = "Scalable Protocols for Authenticated Group Key Exchange",
  journal   = "J. Cryptology",
  volume    = "20",
  number    = 1,
  year      = 2007,
  pages     = "85-113",
  ee        = "http://dx.doi.org/10.1007/s00145-006-0361-5",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}


Article{
  tag = "KehneSchoenwalderLangendorfer92",
  author = 	 "A. Kehne and J. Sch{{o}}enw{{a}}lder and H. Langend{{o}}rfer",
  title = 	 "A Nonce-Based Protocol for Multiple Authentication",
  journal =	 "Operating Systems Review",
  year =	 1992,
  volume =	 26,
  number =	 4,
  pages =	 "84--89"
}

Article{
  tag = "KelseySchneierWagner97",
  author = "John Kelsey and Bruce Schneier and David Wagner",
  title = " Protocol Interactions and the Chosen Protocol Attack",
  booktitle = "Security Protocols Workshop",
  year = 1998,
  ignorepages = "91--104",
  publisher = "Springer"
}

Article{
  tag = "Kemmerer87",
  author = 	 "R. A. Kemmerer",
  title = 	 "Using Formal Verification Techniques to Analyse Encryption Protocols",
  pages =	 "134--139",
  booktitle =	 "Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy",
  year =	 1987,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "Kemmerer89",
  author = 	 "R. A. Kemmerer",
  title = 	 "Analysing Encryption Protocols Using Formal Verification Techniques",
  journal =	 "IEEE Journal on Selected Areas in Communications",
  year =	 1989,
  volume =	 7,
  number =	 4,
  pages =	 "448--457"
}

Article{
  tag = "KesslerWedel94",
  author = 	 "V. Kessler and G. Wedel",
  title = 	 "AUTLOG --- An advanced logic of authentication",
  pages =	 "90--99",
  booktitle =	 "Proceedings of the Computer Security Foundations Workshop VII",
  year =	 1994
}

Article{
  tag = "Kocher96",
  author =       "Paul C. Kocher",
  title =        "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems",
  pages =        "104--113",
  editor =       "Neal Koblitz",
  number =       1109,
  series =       "LNCS",
  booktitle =    "Advances in Cryptology --- {CRYPTO} '96",
  year =         1996,
  publisher =    "Springer"
}

Article{
  tag = "KlayVigneron08",
  author    = "Francis Klay and Laurent Vigneron",
  title     = "Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder",
  booktitle = "Formal Aspects in Security and Trust",
  year      = 2008,
  pages     = "192-209",
  ee        = "http://dx.doi.org/10.1007/978-3-642-01465-9_13",
  crossref  = "DBLP:conf/ifip1-7/2008",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}

Article{
  tag = "KocherJaffeJun99",
  author =       "Paul Kocher and Joshua Jaffe and Benjamin Jun",
  title =        "Differential Power Analysis",
  journal =      "LNCS",
  volume =       "1666",
  pages =        "388--397",
  year =         1999
}

Article{
  tag = "KohlNeuman93",
  author= "J. Kohl and C. Neuman",
  title=  "The {Kerberos} Network Authentication Service (V5)",
  howpublished="{RFC} 1510",
  month=sep,
  year= 1993
}

Article{
  tag = "RFC1510",
  author= "J. Kohl and C. Neuman",
  title=  "The {Kerberos} Network Authentication Service (V5)",
  howpublished="{RFC} 1510",
  month=sep,
  year= 1993
}

Article{
  tag = "KommerlingKuhn99",
  author =       "Oliver K{{o}}mmerling and Markus G. Kuhn",
  title =        "Design Principles for Tamper-Resistant Smartcard Processors",
  pages =        "9--20",
  booktitle =    "Proceedings of the USENIX Workshop on Smartcard Technology",
  year =         1999
}

Article{
  tag = "KremerRaskin02",
  author = 	 "Steve Kremer and Jean-Fran{\c{c}}ois Raskin",
  title = 	 "Game Analysis of Abuse-Free Contract Signing",
  booktitle =	 "Proceedings, 15th Computer Security Foundations Workshop",
  year =	 2002,
  month =	 "June",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "LadkinLeue94",
  author = 	 "Peter B. Ladkin and Stefan Leue",
  title = 	 "Interpreting Message Flow Graphs",
  journal = 	 "Formal Aspects of Computing",
  year = 	 1994,
  volume =	 3,
  number =	 1
}



Article{
  tag = "LakhnechEtAl03",
  author = 	 "L. Bozga and Y. Lakhnech and M. Perin",
  title = 	 "Pattern-based Abstraction for Verifying Secrecy in Protocols",
  booktitle = "Tools and Algorithms for Construction and Analysis of Systems {(TACAS)}",
  year = 	 2003,
  number = 	 2619,
  series = 	 "LNCS",
  publisher = "Springer"}

Article{
  tag = "Lamport78",
  author = 	 "Leslie Lamport",
  title = 	 "Time, clocks and the ordering of events in a distributed system",
  journal = 	 "CACM",
  year = 	 1978,
  volume = 	 21,
  number = 	 7,
  pages = 	 "558–-565"}

Article{
  tag = "LampsonEtAl92",
  author = 	 "Butler Lampson and Mart{\'\i}n Abadi and Michael Burrows and Edward Wobber",
  title = 	 "Authentication in  Distributed Systems:  Theory and Practice",
  journal = 	 "{ACM} Transactions on  Computer Systems",
  year = 	 1992,
  volume =	 10,
  number =	 4,
  pages =	 "265--310",
  month =	 "November"
}

Article{
  tag = "Leroy00",
  title = 	 "The Objective Caml System",
  author =	 "Xavier Leroy and Damien Doligez and Jacques Garrigue and Didier R\'emy and J\'er\^ome Vouillon",
  organization = "{INRIA}",
  address =	 "\texttt{http://caml.inria.fr/}",
  note =	 "Version 3.00",
  year =	 2000
}




Article{
  tag = "LeroyCryptokit05",
  author =	 "Xavier Leroy",
  title =	 "Cryptokit",
  howpublished = "Sofwtare available via \url{http://pauillac.inria.fr/~xleroy/software.html}",
  month =	 "April",
  year =	 2005,
  note =	 "Version 1.3"
}

Article{
  tag = "LiEtAl02",
  author = 	 "Ninghui Li and John C. Mitchell and William H. Winsborough",
  title = 	 "Design of a Role-Based Trust Management Framework",
  booktitle = 	 "Proceedings, 2002 IEEE Symposium on Security and Privacy",
  year =	 2002,
  organization = "May",
  pages =	 "114--130",
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "LiEtAl03a",
  author = 	 "Ninghui Li  and William H. Winsborough and John C. Mitchell",
  title = 	 "Beyond Proof-of-Compliance: Safety and Availability Analysis on Trust Management",
  booktitle = 	 "Proceedings, 2003 IEEE Symposium on Security and Privacy",
  year =	 2003,
  organization = "May",
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "LiEtAl03",
  author = 	 "Ninghui Li and William H. Winsborough and John C. Mitchell",
  title = 	 "Distributed Credential Chain Discovery in Trust Management",
  journal = 	 "Journal of Computer Security",
  year = 	 2003,
  month =	 feb,
  volume =	 11,
  number =	 1,
  pages =	 "35--86"
}

Article{
  tag = "Liebl93",
  author = 	 "Armin Liebl",
  title = 	 "Authentication in Distributed Systems: A Bibliography",
  journal =	 "Operating Systems Review",
  year =	 1993,
  volume =	 27,
  number =	 4,
  pages =	 "122--136",
  month =	 oct
}

Article{
  tag = "Lowe95",
   author = 	 "Gavin Lowe",
   title = 	 "An Attack on the {Needham-Schroeder} Public Key	Authentication Protocol",
   journal =	 "Information Processing   Letters",
   year =	 1995,
   volume =	 56,
   number =	 3,
   pages =	 "131--136",
   month =	 nov
}

Article{
  tag = "Lowe96",
  author = 	 "Gavin Lowe",
  title = 	 "Some New Attacks upon Security Protocols",
  booktitle = 	 "Proceedings of the Computer Security Foundations Workshop IX",
  year =	 1996,
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "Lowe96a",
  author = 	 "Gavin Lowe",
  title = 	 "Breaking and Fixing the {Needham-Schroeder} Public-Key Protocol using {FDR}",
  booktitle = 	 "Proceeedings of {\sc tacas}",
  volume =	 1055,
  series =	 "LNCS",
  year =	 1996,
  publisher =	 "Springer Verlag",
  pages =	 "147--166"
}

Article{
  tag = "Lowe97",
  author = 	 "Gavin Lowe",
  title = 	 "A Hierarchy of Authentication Specifications",
  booktitle = 	 "10th Computer Security Foundations Workshop Proceedings",
  year =	 1997,
  publisher =	 "{IEEE} Computer Society Press",
  pages =	 "31--43"
}

Article{
  tag = "Lowe97a",
  author = 	 "Gavin Lowe",
  title = 	 "Casper:  A Compiler for the Analysis of Security Protocols",
  booktitle = 	 "10th Computer Security Foundations Workshop Proceedings",
  year =	 1997,
  publisher =	 "{IEEE} Computer Society Press",
  pages =	 "18--30"
}

Article{
  tag = "Lowe98",
  author = 	 "Gavin Lowe",
  title = 	 "Toward a Completeness Result for Model Checking of Security Protocols",
  booktitle = 	 "11th Computer Security Foundations Workshop Proceedings",
  year =	 1998,
  publisher =	 "{IEEE} Computer Society Press",
  pages =	 "96--105"
}

Article{
  tag = "Lowe02",
  author = 	 "Gavin Lowe",
  title = 	 "Analyzing Protocols subject to Guessing Attacks",
  booktitle =	 "WITS:  Workshop on Issues in the Theory of Security",
  year =	 2002,
  month =	 "January",
  note =	 "Available at http://www.dsi.unive.it/IFIPWG1\_7/wits2002.html"
}

Article{
  tag = "Lowe03",
  author = 	 "Gavin Lowe",
  title = 	 "Analyzing Protocols subject to Guessing Attacks",
  journal = 	 "Journal of Computer Security",
  year = 	 2003,
  note =	 "Forthcoming"
}



Article{
  tag = "LoweAuty07",
  author = 	 "Gavin Lowe and Michael Auty",
  title = 	 "A Calculus for Security Protocol Development",
  institution =  "Oxford University Computing Laboratory",
  year = 	 2007,
  month = 	 "March"}

Article{
  tag = "WuMalkinBoneh99",
  author =       "T. Wu and M. Malkin and D. Boneh",
  title =        "Building Intrusion Tolerant Applications",
  pages =        "79--91",
  booktitle =    "Proceedings of the 8th USENIX Security Symposium",
  year =         1999
}

Article{
  tag = "MalkinWuBoneh99",
  author =       "M. Malkin and T. Wu and D. Boneh",
  title =        "Experimenting with Shared Generation of RSA Keys",
  pages =        "43--56",
  booktitle =    "Proceedings of the Internet Society's 1999 Symposium on Network and Distributed System Security (SNDSS)",
  year =         1999
}

Article{
  tag = "MaoBoyd93",
  author = 	 "Wenbo Mao and Colin Boyd",
  title = 	 "Towards the Formal Analysis of Security Protocols",
  pages =	 "147--158",
  booktitle =	 "Proceedings of the Computer Security Foundations Workshop VI",
  year =	 1993,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "Maneki99",
  author = 	 "Al Maneki",
  title = 	 "Honest functions and their Application to the Analysis of Cryptographic Protocols",
  booktitle = 	 "Proceedings of the 12th Computer Security Foundations Workshop",
  year =	 1999,
  month =	 "June",
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "MaoBoyd94a",
  author = 	 "Wenbo Mao and Colin Boyd",
  title = 	 "Development of Authentication Protocols: Some Misconceptions and a New Approach",
  booktitle =	 "Proceedings 7th Computer Security Foundations Workshop",
  publisher =	 "IEEE Computer Society Press",
  year =	 1994,
  pages =	 "178--186"
}

Article{
  tag = "MaoBoyd94b",
  author = 	 "Wenbo Mao and Colin Boyd",
  title = 	 "On Strengthening Authentication protocols to Foil Cryptanalysis",
  editor =	 "Dieter Gollmann",
  number =	 875,
  series =	 "LNCS",
  pages =	 "193--204",
  booktitle =	 "Computer Security---ESORICS 94",
  year =	 1994,
  publisher =	 "Springer",
  month =	 nov
}

Article{
  tag = "MarreroEtAl97",
  author = 	 "Will Marrero and Edmund Clarke and Somesh Jha",
  title = 	 "A Model Checker for Authentication Protocols",
  booktitle = 	 "Proceedings of the {DIMACS} Workshop on Design and Verification of Security Protocols",
  year =	 1997,
  editor =	 "Cathy Meadows and Hilary Orman",
  month =	 "September",
  organization = "{DIMACS}, Rutgers University"
}

Article{
  tag = "MaurerMassey93",
  author = 	 "Ueli Maurer and James Massey",
  title = 	 "Cascade Ciphers: The Importance of Being First",
  journal = 	 "Journal of Cryptology",
  year = 	 1993,
  volume =	 6,
  number =	 1,
  pages =	 "55-61"
}

Article{
  tag = "Massey88",
  author = 	 "James L. Massey",
  title = 	 "An Introduction to Contemporary Cryptology",
  journal =	 "Proceedings of the IEEE",
  year =	 1988,
  volume =	 76,
  number =	 5,
  pages =	 "533-549",
  month =	 may
}

Article{
  tag = "Meadows92",
  author = 	 "Catherine Meadows",
  title = 	 "Applying Formal Methods to the Analysis of a Key Management Protocol",
  journal =	 "Journal of Computer Security",
  year =	 1992,
  volume =	 1,
  number =	 1,
  pages =	 "5--35",
  ISSN =         "0926-227X"
}

Article{
  tag = "MayerEtAl00",
  author = 	 "Alain Mayer and Avishai Wool and Elisha Ziskind",
  title = 	 "Fang:  A Firewall Analysis Engine",
  booktitle = 	 "Proceedings, {IEEE} Symposium on Security and Privacy",
  pages =	 "177--187",
  year =	 2000,
  month =	 "May",
  publisher =	 "IEEE CS Press"
}

Article{
  tag = "Meadows94",
  author = 	 "Catherine Meadows",
  title = 	 "A Model of Computation for the {NRL} Protocol Analyzer",
  booktitle = 	 "Proceedings of the Computer Security Foundations Workshop VII",
  year =	 1994,
  organization = "{IEEE}",
  publisher =	 "{IEEE} Computer Society Press",
  pages =	 "84--89"
}

Article{
  tag = "Meadows99",
  author = 	 "Catherine Meadows",
  title = 	 "Analysis of the {Internet} {Key} {Exchange} Protocol using the {NRL} Protocol Analyzer",
  booktitle = 	 "Proceedings, 1999 IEEE Symposium on Security and Privacy",
  year =	 1999,
  month =	 "May",
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "Meadows00",
  author = 	 "Catherine Meadows",
  title = 	 "Open Issues in Formal Methods for Cryptographic Protocol Analysis",
  booktitle = 	 "{DISCEX} Workshop",
  year =	 2000,
  month =	 "January",
  organization = "DARPA"
}

Article{
  tag = "Meadows00a",
  author = 	 "Catherine Meadows",
  title = 	 "Invariant Generation Techniques in Cryptographic Protocol Analsyis",
  booktitle = 	 "Proceedings, 13th Computer Security Foundations Workshop",
  year =	 2000,
  month =	 "July",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "MillenClarkFreedman87",
  author = 	 "J. K. Millen and S. C. Clark and S. B. Freedman",
  title = 	 "The {Interrogator}: Protocol Security Analysis",
  journal =	 "IEEE Transactions on Software Engineering",
  year =	 1987,
  volume =	 13,
  number =	 2,
  pages =	 "274--288",
  month =	 feb
}

Article{
  tag = "Millen95",
  author = 	 "Jonathan K. Millen",
  title = 	 "The {Interrogator} Model",
  booktitle = 	 "Proceedings of the 1995 IEEE Symposium on Security and Privacy",
  year =	 1995,
  pages =	 "251--60"
}

Article{
  tag = "Millen03",
  author = 	 "Jonathan K. Millen",
  title = 	 "On the Freedom of Encryption",
  journal = 	 "Information Processing Letters",
  year = 	 2003,
  volume =	 86,
  number =	 6,
  pages =	 "329--333"
}

Article{
  tag = "MillenMuller01",
  author = 	 "Jonathan Millen and Frederic Muller",
  title = 	 "Cryptographic Protocol Generation from {CAPSL}",
  institution =  "{SRI} International",
  year = 	 2001,
  number =	 "SRI-CSL-01-07",
  month =	 "December"
}

Article{
  tag = "MillenRuess00",
  author = 	 "Jonathan K. Millen and Harald Ruess",
  title = 	 "Protocol-Independent Secrecy",
  booktitle = 	 "Proceedings, 2000 IEEE Symposium on Security and Privacy",
  year =	 2000,
  month =	 "May",
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "MillenShmatikov01",
  author = 	 "Jonathan K. Millen and  Vitaly Shmatikov",
  title = 	 "Constraint Solving for Bounded-Process Cryptographic Protocol Analysis",
  booktitle =	 "8th ACM Conference on Computer and Communications Security (CCS '01)",
  pages =	 "166--175",
  year =	 2001,
  organization = "ACM"
}

Article{
  tag = "MillerNeumanSchillerSaltzer87",
  author = 	 "S. P. Miller and C. Neuman and J. I. Schiller and Jerry H. Saltzer",
  title = 	 "Project Athena Technical Plan (Section E.2.1)",
  institution =  "MIT",
  year = 	 1987,
  month =	 jul
}

Article{
  tag = "Milner89",
  author = 	 "Robin Milner",
  title = 	 "Communication and Concurrency",
  publisher = 	 "Prentice-Hall International",
  year = 	 1989,
  address = 	 "Englewood Cliffs",
  patron =	"Guttman"
}

Article{
  tag = "Minear95",
  author =       "Spencer E. Minear",
  title =        "Providing Policy Control Over Object Operations in a Mach Based System",
  booktitle =    "Proceedings of the Fifth USENIX UNIX Security Symposium",
  pages =        "141--156",
  year =         1995,
  month =        "June"
}

Article{
  tag = "Mockapetris87",
  author =	 "P. Mockapetris",
  title =	 "Domain Names - Concepts and Facilities",
  howpublished = "{RFC} 1034",
  month =	 "November",
  year =	 1987
}

Article{
  tag = "RFC1034",
  author =	 "P. Mockapetris",
  title =	 "Domain Names - Concepts and Facilities",
  howpublished = "{RFC} 1034",
  month =	 "November",
  year =	 1987
}

Article{
  tag = "Mockapetris87a",
  author =	 "P. Mockapetris",
  title =	 "Domain Names - Implementation and Specification",
  howpublished = "{RFC} 1035",
  month =	 "November",
  year =	 1987
}

Article{
  tag = "RFC1035",
  author =	 "P. Mockapetris",
  title =	 "Domain Names - Implementation and Specification",
  howpublished = "{RFC} 1035",
  month =	 "November",
  year =	 1987
}

Article{
  tag = "Moore88",
  author = 	 "Judy H. Moore",
  title = 	 "Protocol Failures in Cryptosystems",
  journal =	 "Proceedings of the IEEE",
  year =	 1988,
  volume =	 76,
  number =	 5,
  month =	 may
}

Article{
  tag = "MooreAndersonKuhn00",
  author =       "S. Moore and R. Anderson and M. Kuhn",
  title =        "Improving Smartcard Security using Self-Timed Circuit Technology",
  booktitle =    "Fourth AciD-WG Workshop",
  year =         2000
}

Article{
  tag = "MooreEtAl02",
  author =       "Simon Moore and Ross Anderson and Paul Cunningham and Robert Mullins and George Taylor",
  title =        "Improving Smart Card Security using Self-Timed Circuits",
  booktitle =    "Eigth International Symposium on Advanced Research in Asynchronous Circuits and Systems",
  year =         2002
}

Article{
  tag = "Moser89",
  author = 	 "Louise E. Moser",
  title = 	 "A Logic of Knowledge and Belief about Computer Security",
  editor =	 "J Thomas Haigh",
  pages =	 "57--63",
  booktitle =	 "Proceedings of the Computer Security Foundations Workshop III",
  organization = "IEEE",
  publisher =	 "Computer Society Press of the IEEE",
  year =	 1989
}

Article{
  tag = "MitchellEtAl97",
  author = 	 "John C. Mitchell and Mark Mitchell and Ulrich Stern",
  title = 	 "Automated Analysis of Cryptographic Protocols using {Mur}$\varphi$",
  booktitle = 	 "Proceedings, 1997 IEEE Symposium on Security and Privacy",
  pages =	 "141--151",
  year =	 1997,
  organization = "IEEE",
  publisher =	 "Computer Society Press of the IEEE"
}

                  

Article{
  tag = "MostrousEtAl09",
  author = 	 "Dimitris Mostrous and Nobuko Yoshida and Kohei Honda",
  title = 	 "Global principal typing in partially commutative asynchronous sessions",
  booktitle = "{ESOP} Proceedings",
  year = 	 2009,
  series = 	 "LNCS",
  month = 	 "March"}




Article{
  tag = "rfc2560",
  author = 	 "M.Myers and R.Ankney and A.Malpani and S.Galperin and C. Adams",
  title = 	 "X.509 Internet Public Key Infrastructure: Online Certificate Status Protocol - OCSP",
  howpublished = "Internet Request for Comments 2560",
  month = 	 "June",
  year = 	 1999,
  note = 	 "Available at \texttt{http://www.ietf.org/rfc/rfc2560.txt}"
}

Article{
  tag = "NeedhamSchroeder78",
  author = 	 "Roger Needham and Michael Schroeder",
  title = 	 "Using Encryption for Authentication in Large Networks of Computers",
  journal =	 "{CACM}",
  year =	 1978,
  volume =	 21,
  number =	 12,
  month =	 dec
}

Article{
  tag = "NeedhamSchroeder87",
  author = 	 "Roger M. Needham and M. D. Schroeder",
  title = 	 "Authentication Revisited",
  journal =	 "Operating Systems Review",
  year =	 1987,
  volume =	 21,
  number =	 7,
  pages =	 "7--7",
  month =	 jan
}

Article{
  tag = "Nessett90",
  author = 	 "Daniel M. Nessett",
  title = 	 "A Critique of the {Burrows}, {Abadi} and {Needham} Logic",
  journal =	 "ACM Operating Systems Review",
  year =	 1990,
  volume =	 24,
  number =	 2,
  pages =	 "35--38",
  month =	 apr
}

Article{
  tag = "NeumanStubblebine93",
  author = 	 "B. Clifford Neuman and Stuart G. Stubblebine",
  title = 	 "A Note on the Use of Timestamps as Nonces",
  journal =	 "Operating Systems Review",
  year =	 1993,
  volume =	 27,
  number =	 2,
  pages =	 "10--14",
  month =	 apr
}

Article{
  tag = "Ng03",
  author = 	 "Siaw-Lynn Ng",
  title = 	 "Posets and protocols:  Picking the right three-party protocol",
  journal = 	 "{IEEE} Journal on Selected Areas in Communication",
  month =	 "January",
  pages =	 "55--61",
  year = 	 2003
}

Article{
  tag = "NuSMV01",
  key =		 "NuSMV",
  title =	 "{NuSMV}: a new symbolic model checker",
  howpublished = "URL \url{http://sra.itc.it/tools/nusmv}",
  year =	 2001
}

Article{
  tag = "OlawskyEtAl96",
  author =       "D. Olawsky and T. Fine and E. Schneider and R. Spencer",
  title =        "Developing and Using a Policy Neutral Access Control Policy",
  booktitle =    "Proceedings of the New Security Paradigms Workshop",
  year =         1996,
  month =        "September"
}

Article{
  tag = "Ottawa01",
  author =       "P. Loscocco and S. Smalley",
  title =        "Meeting Critical Security Objectives with Security-Enhanced {Linux}",
  booktitle =    "Proceedings of the 2001 Ottawa Linux Symposium",
  year =         2001
}

Article{
  tag = "OtwayRees87",
  author = 	 "D. Otway and O. Rees",
  title = 	 "Efficient and Timely Mutual Authentication",
  journal =	 "Operating Systems Review",
  year =	 1987,
  volume =	 21,
  number =	 1,
  pages =	 "8--10",
  month =	 jan
}

Article{
  tag = "PCKS1",
  author =	 "{RSA} Laboratories",
  title =	 "{PCKS} \#1: {RSA} Encryption Standard",
  month =	 "November",
  year =	 1993,
  note =	 "Version 1.5"
}

Article{
  tag = "Patel97",
  author = 	 "Sarvar Patel",
  title = 	 "Number Theoretic Attacks on Secure Password Schemes",
  booktitle = 	 "Proceedings of the 1997 {IEEE} Symposium on Security and Privacy",
  pages =	 "236--247",
  year =	 1997,
  month =	 "May",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "Paulson94",
  author =	 "L. C. Paulson",
  title = 	 "Isabelle:  A Generic Theorem Prover",
  publisher = 	 "Springer Verlag",
  year = 	 1994,
  number =	 828,
  series =	 "LNCS"
}

Article{
  tag = "Paulson97",
  author = 	 "Lawrence C. Paulson",
  title = 	 "Proving Properties of Security Protocols by Induction",
  booktitle = 	 "10th {IEEE} Computer Security Foundations Workshop",
  year =	 1997,
  publisher =	 "IEEE Computer Society Press",
  pages =	 "70--83"
}

Article{
  tag = "Paulson97a",
  author = 	 "Lawrence C. Paulson",
  title = 	 "Mechanized Proofs of a Recursive Authentication Protocol",
  booktitle = 	 "10th {IEEE} Computer Security Foundations Workshop",
  year =	 1997,
  publisher =	 "IEEE Computer Society Press",
  pages =	 "84--94"
}

Article{
  tag = "Paulson97b",
  author = 	 "Lawrence C. Paulson",
  title = 	 "On Two Formal Analyses of the {Yahalom} Protocol",
  institution =  "Cambridge University Computer Laboratory",
  year = 	 1997,
  number =	 432,
  month =	 "July",
  annote =	 "http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html"
}

Article{
  tag = "Paulson97c",
  author = 	 "Lawrence C. Paulson",
  title = 	 "Relations between secrets: Two Formal Analyses of the {Yahalom} Protocol",
  journal = 	 "Journal of Computer Security",
  year = 	 2001,
  annote =	 "http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html"
}

Article{
  tag = "Paulson97d",
  author = 	 "Lawrence C. Paulson",
  title = 	 "Relations between secrets: Two Formal Analyses of the {Yahalom} Protocol",
  journal = 	 "Journal of Computer Security",
  year = 	 2001,
  note =	 "Also available as Cambridge University Computer Laboratory Technical Report 432 (1997)",
  annote =	 "http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html"
}

Article{
  tag = "Paulson98",
  author = 	 "Lawrence C. Paulson",
  title = 	 "The Inductive Approach to Verifying Cryptographic Protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 1998,
  note =	 "Also Report 443, Cambridge University Computer Lab",
  annote =	 "From http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html"
}

Article{
  tag = "Paulson99",
  author = 	 "Lawrence C. Paulson",
  title = 	 "Inductive analysis of the {Internet} protocol {TLS}",
  journal = 	 "ACM Transactions on Computer and System Security",
  year = 	 1999,
  annote =	 "From http://www.cl.cam.ac.uk/users/lcp/papers/protocols.html"
}

Article{
  tag = "PfitzmannEtAl00",
  author = 	 "Birgit Pfitzmann and Matthias Schunter and Michael Waidner",
  title = 	 "Cryptographic Security of Reactive Systems",
  journal = 	 "Electronic Notes in Theoretical Computer Science",
  year = 	 2000,
  volume =	 32
}




Article{
  tag = "PfitzmannWaidner00",
  author = 	 "Birgit Pfitzmann and Michael Waidner",
  title = 	 "Composition and Integrity Preservation of Secure Reactive Systems",
  booktitle =	 "Proceedings, Seventh ACM Conference of Communication and Computer Security",
  year =	 2000,
  month =	 "November",
  organization = "{ACM}"
}

Article{
  tag = "PfitzmannWaidner01",
  author = 	 "Birgit Pfitzmann and Michael Waidner",
  title = 	 "A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission",
  booktitle =	 "Proceedings, 2001 IEEE Symposium on Security and Privacy",
  year =	 2001,
  month =	 May,
  publisher =	 "{IEEE CS} Press",
  url = "citeseer.nj.nec.com/pfitzmann00model.html",

  note =	 "Preprint at \url{http://iacr.org/2000/066.ps.gz}"
}

Article{
  tag = "Prawitz65",
  author =	 "Dag Prawitz",
  title = 	 "Natural Deduction:  A Proof-Theoretic Study",
  publisher = 	 "Almqvist and Wiksel",
  year = 	 1965,
  address =	 "Stockholm"
}

Article{
  tag = "PurdyEtAl82",
  author = 	 "G. B. Purdy and G. J. Simmons and J. A. Studier",
  title = 	 "A Software Protection Scheme",
  booktitle = 	 "1982 IEEE Symposium on Security and Privacy",
  year =	 1982,
  pages =	 "99--103"
}

Article{
  tag = "PearsonEtAl03",
  author =	 "Boris Balacheff and Liqun Chen and Siani Pearson and David Plaquin and Graeme Proudler",
  title = 	 "Trusted Computing Platforms: {TCPA} Technology in Context",
  publisher = 	 "Prentice Hall PTR",
  year = 	 2003,
  address =	 "Upper Saddle River, NJ"
}

Article{
  tag = "QuisquaterSamyde01",
  author =       "J.J. Quisquater and D. Samyde",
  title =        "ElectroMagnetic Analysis (EMA): Measures and Countermeasures for Smart Cards",
  booktitle =    "International Conference on Research in Smart Cards (E-smart 2001)",
  pages =        "200--210",
  month =        "September",
  year =         2001
}

Article{
  tag = "cpsaspec09",
  title = 	 "The {CPSA} Specification: A Reduction System for Searching for Shapes in Cryptographic Protocols",
  author = 	 "John D.~Ramsdell and Joshua D.~Guttman and Paul D.~Rowe",
  organization = "The MITRE Corporation",
  year = 	 2009,
  note = 	 "In \url{http://hackage.haskell.org/package/cpsa} source distribution, \texttt{doc} directory",
}

Article{
  tag = "cpsa09",
  author = 	 "John D. Ramsdell and Joshua D. Guttman",
  title = 	 "{CPSA}: A cryptographic protocol shapes analyzer",
  booktitle = 	 "Hackage",
  publisher =    "The MITRE Corporation",
  year = 	 2009,
  note = 	 "\url{http://hackage.haskell.org/package/cpsa}; see esp.~\texttt{doc} subdirectory"}

Article{
  tag = "rfc1661",
  author =	 "W. Simpson",
  title =	 "The Point--to--Point Protocol",
  howpublished = "RFC 1661",
  month =	 "July",
  year =	 1994
}

Article{
  tag = "rfc2420",
  author =	 "H. Jummert",
  title =	 "The {PPP} Triple--{DES} Encryption Protocol",
  howpublished = "RFC 2420",
  month =	 "September",
  year =	 1998
}

Article{
  tag = "rfc2419",
  author =	 "K Sklower and G. Meyer",
  title =	 "The {PPP} {DES} Encryption Protocol, Version 2",
  howpublished = "{RFC} 2419",
  month =	 "September",
  year =	 1998
}

Article{
  tag = "rfc1968",
  author =	 "G. Meyer",
  title =	 "The {PPP} Encryption Control Protocol",
  howpublished = "{RFC} 1968",
  month =	 "June",
  year =	 1996
}

Article{
  tag = "rfc2284",
  author =	 "L. Blunk",
  title =	 "{PPP} Extensible Authentication Protocol",
  howpublished = "RFC 2284",
  month =	 "March",
  year =	 1998
}

Article{
  tag = "rfc2716",
  author =	 "B. Aboba and D. Simon",
  title =	 "{PPP} {EAP} {TLS} Authentication Protocol",
  howpublished = "{RFC} 2716",
  month =	 "October",
  year =	 1999
}

Article{
  tag = "rfc:2401",
        TITLE = "Security Architecture for the Internet Protocol",
        ORGANIZATION = "{IETF} Network Working Group {RFC} 2401",
        AUTHOR = "S. Kent and R. Atkinson",
        MONTH = "November",
        YEAR = 1998 }

Article{
  tag = "rfc:2402",
	TITLE = "IP Authentication Header",
	ORGANIZATION = "IETF Network Working Group {RFC} 2402",
	AUTHOR = "S. Kent and R. Atkinson",
	MONTH = "November",
	YEAR = 1998 }

Article{
  tag = "rfc:2406",
        TITLE = "IP Encapsulating Security Payload",
        ORGANIZATION = "IETF Network Working Group {RFC} 2406",
        AUTHOR = "S. Kent and R. Atkinson",
        MONTH = "November",
        YEAR = 1998 }

Article{
  tag = "rfc:2407",
        TITLE = "The Internet IP Security Domain of Interpretation for ISAKMP",
        ORGANIZATION = "IETF Network Working Group {RFC} 2407",
        AUTHOR = "D. Piper",
        MONTH = "November",
        YEAR = 1998 }

Article{
  tag = "rfc:2408",
        TITLE = "Internet Security Association and Key Management Protocol (ISAKMP)",
        ORGANIZATION = "IETF Network Working Group {RFC} 2408",
        AUTHOR = "D. Maughan and M. Schertler and M. Schneider and J. Turner",
        MONTH = "November",
        YEAR = 1998 }

Article{
  tag = "rfc:2409",
        TITLE = "The Internet Key Exchange (IKE)",
        ORGANIZATION = "IETF Network Working Group {RFC} 2409",
        AUTHOR = "D. Harkins and D. Carrel",
        MONTH = "November",
        YEAR = 1998 }
                  
Article{
  tag = "Rabin81",
  title= "How to exchange secrets by oblivious transfer",
  author= "Michael Rabin",
  year= "1981",
  institution= "Technical Report TR-81, Harvard Aiken Computation Laboratory", 
note = "Available at \url{http://eprint.iacr.org/2005/187}"
}


Article{
  tag = "RivestShamirAdleman78",
  author = 	 "R. Rivest and A. Shamir and L. Adleman",
  title = 	 "A Method for Obtaining Digital Signatures and Public Key Cryptosystems",
  journal = 	 "Communications of the ACM",
  year = 	 1978,
  volume = 	 21,
  number = 	 2,
  pages = 	 "120--126",
  month = 	 feb
}

Article{
  tag = "Roscoe94",
  author = 	 "A. W. Roscoe",
  title = 	 "Model-Checking {CSP}",
  booktitle = 	 "A Classical Mind:  Essays in Honour of C. A. R. Hoare",
  publisher =	 "Prentice-Hall",
  year =	 1994,
  editor =	 "A. W. Roscoe"
}

Article{
  tag = "Roscoe95",
  author = 	 "A. W. Roscoe",
  title = 	 "Modeling and Verifying Key-Exchange Protocols Using {CSP} and {FDR}",
  booktitle = 	 "Proceedings of the 8th {IEEE} Computer Security Foundations Workshop",
  year =	 1995,
  pages =	 "98--107"
}

Article{
  tag = "Roscoe96",
  author = 	 "A. W. Roscoe",
  title = 	 "Intensional Specifications of Security Protocols",
  booktitle = 	 "Proceedings of the 9th {IEEE} Computer Security Foundations Workshop",
  year =	 1996,
  pages =	 "28--38"
}

Article{
  tag = "Roscoe97",
  author =	 "A. W. Roscoe",
  title = 	 "The Theory and Practice of Concurrency",
  publisher = 	 "Prentice-Hall",
  year = 	 1997
}

Article{
  tag = "RoscoeGoldsmith99",
  author = 	 "A. W. Roscoe and M. H. Goldsmith",
  title = 	 "What is Intransitive Noninterference?",
  booktitle =	 "12th {IEEE} Computer Security Foundations Workshop",
  pages =	 "228--238",
  year =	 1999,
  month =	 "June",
  publisher =	 "{IEEE} {CS} Press"
}

Article{
  tag = "RubinHoneyman93",
  author = 	 "A. D. Rubin and P. Honeyman",
  title = 	 "Formal Methods for the Analysis of Authentication Protocols",
  institution =  "CITI",
  year = 	 1993,
  number =	 "Technical report 93--7",
  month =	 nov
}

Article{
  tag = "RubinHoneyman94",
  author = 	 "A. D. Rubin and P. Honeyman",
  title = 	 "Nonmonotonic Crytpographic Protocols",
  pages =	 "100--115",
  booktitle =	 "Proceedings of the Computer Security Foundations Workshop VII",
  year =	 1994,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "RusinowitchTuruani01",
  author    = "Micha{e}l Rusinowitch and Mathieu Turuani", 
  title     = "Protocol Insecurity with Finite Number of Sessions is {NP}-Complete",
  booktitle = "Computer Security Foundations Workshop",
  year      = 2001,
  pages     = "174-",
  ee        = "http://csdl.computer.org/comp/proceedings/csfw/2001/1146/00/11460174abs.htm",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}


Article{
  tag = "RyanSchneider98",
  author = 	 "Peter Y. A. Ryan and Steve Schneider",
  title = 	 "An Attack on {APM}'s Recursive Authentication Protocol---a Cautionary Tale",
  journal = 	 "Information Processing Letters",
  year = 	 1998,
  volume =	 65
}

Article{
  tag = "SabelfeldMyers03",
  author = 	 "Andrei Sabelfeld and Andrew C. Myers",
  title = 	 "Language-based Information-Flow Security",
  journal = 	 "{IEEE} Journal on Selected Areas in Communication",
  year = 	 2003,
  volume =	 21,
  number =	 1,
  pages =	 "5--19",
  month =	 "January"
}

Article{
  tag = "Satyanarayanan87",
  author = 	 "N. Satyanarayanan",
  title = 	 "Integrating Security in a Large Distributed System",
  institution =  "CMU",
  year = 	 1987,
  number =	 "iCMU-CS-87-179",
  month =	 "nov"
}

Article{
  tag = "Schneider96",
  author = 	 "Steve Schneider",
  title = 	 "Security Properties and {CSP}",
  booktitle = 	 "Proceedings, 1996 {IEEE} Symposium on Security and Privacy",
  pages =	 "174--87",
  year =	 1996,
  month =	 "May",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "Schneider97",
  author = 	 "Steve Schneider",
  title = 	 "Verifying Authentication Protocols with {CSP}",
  booktitle = 	 "Proceedings of the 10th {IEEE} Computer Security Foundations Workshop",
  year =	 1997,
  publisher =	 "IEEE Computer Society Press",
  pages =	 "3--17"
}

Article{
  tag = "Schneier93",
  author = 	 "B. Schneier",
  title = 	 "The IDEA Encryption Algorithm",
  journal =	 "Dr. Dobb's Journal",
  year =	 1993,
  pages =	 "50--56",
  month =	 "December"
}

Article{
  tag = "Schneier94",
  author = 	 "Bruce Schneier",
  title = 	 "Applied Cryptography",
  publisher = 	 "Wiley",
  year = 	 1994
}

Article{
  tag = "SchneierShostack99",
  author =      "Bruce Schneier and Adam Shostack",
  title =       "Breaking Up Is Hard To Do: Modeling Security Threats for Smart Cards",
  note =        "Counterpane Systems and Netect, Inc., available at http://www.counterpane.com/smart-card-threats.html",
  year =        1999
}

Article{
  tag = "FergusonSchneier99",
         AUTHOR = "Niels Ferguson and Bruce Schneier",
         TITLE = "A Cryptographic Evaluation of IPsec",
         NOTE = "Counterpane Internet Security, Inc., available at http://www.counterpane.com/ipsec.html",
	 year = 1999
}

Article{
  tag = "Selinger01",
  author    = "Peter Selinger",
  title     = "Models for an adversary-centric protocol logic",
  journal   = "Electr. Notes Theor. Comput. Sci.",
  volume    = "55",
  number    = 1,
  year      = 2001,
  ee        = "http://www.elsevier.com/gej-ng/31/29/23/83/27/show/Products/notes/index.htt\#007",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}


Article{
  tag = "SELinux03",
  author =	 "{National Security Agency}",
  title =	 "Security-Enhanced {Linux}",
  howpublished = "At URL \url{http://www.nsa.gov/selinux/index.html}",
  month =	 "April",
  year =	 2003
}

Article{
  tag = "SetSpec97",
  key =		 "SET",
  title =	 "{SET} Secure Electronic Transaction Specification",
  month =	 "May",
  year =	 1997,
  note =	 "Available at {http://www.setco.org/download.html}"
}

Article{
  tag = "SELTechRep",
  author =       "P. Loscocco and S. Smalley",
  title =        "Integrating Flexible Support for Security Policies into the Linux Operating System",
  institution =  "NSA, NAI Labs",
  year =         2001,
  month =        "April"
}

Article{
  tag = "sendmail01",
  author =       "Franklin Haskell",
  title =        "Confining Sendmail Using Security-Enhanced Linux",
  month =        "October",
  year =         2001
}

Article{
  tag = "Shamir00",
  author =       "A. Shamir",
  title =        "Protecting Smart Cards from Passive Power Analysis with Detached Power Supplies",
  booktitle =    "CHES 2000, Springer-Verlag",
  year =         2000,
  pages =        "71--77"
}

Article{
  tag = "Shoup99",
  author =	 "Victor Shoup",
  title =	 "On Formal Models for Secure Key Exchange",
  institution =	 "IBM Research",
  year =	 1999,
  type =	 "Research Report",
  number =	 "RZ 3120 (\#93166)",
  month =	 Apr,
  day =		 19,
  note =	 "A revised version 4, dated November 15, 1999, is available from \url{http://www.shoup.net/papers/}"
}

Article{
  tag = "Simmons85",
  author = 	 "Gustavus J. Simmons",
  title = 	 "How to (Selectively) Broadcast a Secret",
  booktitle = 	 "1985 IEEE Symposium on Security and Privacy",
  year =	 1985,
  pages =	 "108--113"
}

Article{
  tag = "Simmons88",
  author = 	 "G.J. Simmons",
  title = 	 "How to Insure that Data Aquired to Verify Treaty Compliance are Trustworthy",
  journal =	 "Proceedings of the IEEE",
  year =	 1988,
  volume =	 76,
  number =	 5,
  pages =	 "621--627",
  month =	 "May"
}

Article{
  tag = "SkoroAnderson02",
  author =       "Sergei Skorobogatov and Ross Anderson",
  title =        "Optical Fault Induction Attacks",
  year =         2002,
  note =         "University of Cambridge, Computer Laboratory. Available at http://www.ftp.cl.cam.ac.uk/ftp/users/rja14/faultpap3.pdf"
}

Article{
  tag = "SmidBranstad88",
  author = 	 "Miles E. Smid and Dennis K. Branstad",
  title = 	 "The Data Encryption Standard: Past and Future",
  journal =	 "Proceedings of the IEEE",
  year =	 1988,
  volume =	 76,
  number =	 5,
  pages =	 "550--559",
  month =	 may
}

Article{
  tag = "Snekkenes91",
  author = 	 "Einar Snekkenes",
  title = 	 "Exploring the BAN Approach to Protocol Analysis",
  pages =	 "171--181",
  booktitle =	 "1991 IEEE Symposium on Research in Security and Privacy",
  year =	 1991,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "Snekkenes92",
  author = 	 "E. Snekkenes",
  title = 	 "Roles in Cryptographic protocols",
  booktitle =	 "Proceedings of the 1992 IEEE Symposium  on Security and Privacy",
  year =	 1992,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "Song99",
  author = 	 "Dawn Xiaodong Song",
  title = 	 "Athena: a New Efficient Automated Checker for Security Protocol Analysis",
  booktitle = 	 "Proceedings of the 12th {IEEE} Computer Security Foundations Workshop",
  year =	 1999,
  month =	 "June",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "PerrigSong00",
  author = 	 "Adrian Perrig and Dawn Xiaodong Song",
  title = 	 "Looking for Diamonds in the Desert:  Extending Automatic Protocol Generation to Three-Party Authentication and Key Agreement Protocols",
  booktitle = 	 "Proceedings of the 13th {IEEE} Computer Security Foundations Workshop",
  year =	 2000,
  month =	 "July",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "PerrigSong00a",
  author = 	 "Adrian Perrig and Dawn Xiaodong Song",
  title = 	 "A First Step Toward the Automatic Generation of Security Protocols",
  booktitle = 	 "Network and Distributed System Security Symposium",
  year =	 2000,
  month =	 "February",
  publisher =	 "Internet Society"
}




Article{
  tag = "SpiessensVanRoy05",
  author = 	 "Fred Spiessens and Peter {Van Roy}",
  title = 	 "A Practical Formal Model for Safety Analysis in Capability-Based Systems",
  booktitle =	 "Trust in Global Computing",
  year =	 2005,
  editor =	 "Rocco De Nicola and Davide Sangiorgi",
  number =	 3705,
  series =	 "LNCS",
  publisher =	 "Springer"
}

Article{
  tag = "RamanujamSuresh03",
  author = 	 "R. Ramanujam and S. P. Suresh",
  title = 	 "A Decidable Subclass of Unbounded Security Protocol",
  booktitle =	 "WITS '03: Workshop on Issues in the Theory of Security",
  pages =	 "11--20",
  year =	 2003,
  editor =	 "R. Gorrieri",
  address =	 "Warsaw",
  month =	 "April"
}



Article{
  tag = "RamanujamSuresh05",
  author = 	 "R. Ramanujam and S. P. Suresh",
  title = 	 "Decidability of Context-Explicit Security Protocols",
  journal = 	 "Journal of Computer Security",
  year = 	 2005,
  volume =	 13,
  number =	 1,
  pages =	 "135--166",
  note =	 "Preliminary version appeared in WITS '03, \emph{Workshop on Issues in the Theory of Security}, Warsaw, April 2003"
}

                  

Article{
  tag = "SegallGuttman08",
  author = 	 "Ariel Segall and Joshua Guttman",
  title = 	 "A Strand Space/Multiset Rewriting Model of {TPM} Commands",
  institution =  "The MITRE Corporation",
  year = 	 2008,
  type = 	 "MTR",
  number = 	 080181,
  address = 	 "Bedford, MA",
  month = 	 "July"}

Article{
  tag = "SpencerSmalleyEtAl99",
  author =       "R. Spencer and S. Smalley and P. Loscocco and M. Hibler and D. Anderson and J. Lepreau",
  title =        "The Flask Security Architecture: System Support for Diverse Security Policies",
  booktitle =    "Proceedings of the Eighth USENIX Security Symposium",
  year =         1999,
  month =        "August",
  pages =        "123--139"
}

Article{
  tag = "Stoller99",
  author = 	 "Scott Stoller",
  title = 	 "A Reduction for Automated Verification of Authentication Protocols",
  booktitle = 	 "Workshop on Formal Methods and Security Protocols",
  year =	 1999,
  month =	 "July",
  note =	 "Available at http://www.cs.indiana.edu/\~{ }stoller/"
}

Article{
  tag = "Stoller99a",
  author = 	 "Scott Stoller",
  title = 	 "A Bound on Attacks on Authentication Protocols",
  note = 	 "Available at http://www.cs.indiana.edu/\~{ }stoller/",
  month =	 "July",
  year =	 1999
}

Article{
  tag = "StubblebineGligor92",
  author = 	 "Stuart G. Stubblebine and Virgil D. Gligor",
  title = 	 "On Message Integrity in Cryptographic Protocols",
  pages =	 "85-104",
  booktitle =	 "Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy",
  year =	 1992,
  publisher =	 "IEEE"
}

Article{
  tag = "Sutherland86",
  author = 	 "David Sutherland",
  title = 	 "A Model of Information",
  booktitle =	 "9th National Computer Security Conference",
  year =	 1986,
  organization = "National Institute of Standards and Technology"
}

Article{
  tag = "Syverson91",
  author = 	 "Paul Syverson",
  title = 	 "The Use of Logic in the Analysis of Cryptographic Protocols",
  booktitle =	 "Proceedings of the 1991 IEEE Symposium on Security and Privacy",
  publisher =	 "IEEE Computer Society",
  year =	 1991,
  editor =	 "Teresa F. Lunt and John McLean",
  pages =	 "156--170",
  month =	 may
}

Article{
  tag = "Syverson94a",
  author = 	 "Paul Syverson",
  title = 	 "A Taxonomy Of Replay Attacks",
  pages =	 "131--136",
  booktitle =	 "Proceedings of the 7th IEEE  Computer Security Foundations Workshop",
  year =	 1994,
  publisher =	 "IEEE Computer Society Press"
}

Article{
  tag = "Syverson94b",
  author = 	 "Paul Syverson",
  title = 	 "On Key Distribution for Repeated Authentication",
  pages =	 "24--30",
  booktitle =	 "Operating Systems Review",
  year =	 1994
}

Article{
  tag = "Syverson99",
  author = 	 "Paul Syverson",
  title = 	 "Towards a Strand Semantics for Authentication Logic",
  journal = 	 "Electronic Notes in Theoretical Computer Science",
  year = 	 1999,
  volume =	 20
}

Article{
  tag = "SyversonMeadows93",
  author = 	 "Paul Syverson and Catherine Meadows",
  title = 	 "A Logic language for Specifying Cryptographic Protocol Requirements",
  pages =	 "165--177",
  booktitle =	 "Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy",
  year =	 1993,
  publisher =	 "IEEE Computer Society Press",
  month =	 May
}

Article{
  tag = "Tarski28",
  author = 	"A. Tarski",
  title = 	"On some Fundamental Concepts of Metamathematics",
  booktitle = 	"Logic, Semantics, Meta-Mathematics",
  publisher = 	"Hackett Publishing Company",
  year = 	1983,
  editor = 	"J. Corcoran",
  chapter = 	"III",
  pages = 	"30--37"
}

Article{
  tag = "Tarski35",
  author = 	"A. Tarski",
  title = 	"On the Concept of Logical Consequence",
  booktitle = 	"Logic, Semantics, Meta-Mathematics",
  publisher = 	"Hackett Publishing Company",
  year = 	1983,
  editor = 	"J. Corcoran",
  chapter = 	"XVI",
  pages = 	"409--420"
}

Article{
  tag = "TatebayashiEtAl90",
  author = 	 "M. Tatebayashi and N. Matsuzaki and D. Newman",
  title = 	 "Key Distribution Protocol for Digital Mobile Communication Systems",
  booktitle = 	 "Advances in Cryptology:  {\sc crypto} '89",
  editor =	 "G. Brassard",
  volume =	 435,
  series =	 "LNCS",
  year =	 1990,
  publisher =	 "Springer Verlag",
  pages =	 "324--331"
}

Article{
  tag = "ThayerHerzogGuttman97",
  author = 	 "F. Javier {\textsc{Thayer} F\'{a}brega} and Jonathan C. Herzog and Joshua D. Guttman",
  title = 	 "Strand Spaces",
  institution =  "The {\sc Mitre} Corporation",
  year = 	 1997,
  month = 	 "November"
}

Article{
  tag = "ThayerHerzogGuttman98",
  author = 	 "F. Javier {\textsc{Thayer} F\'{a}brega} and Jonathan C. Herzog and Joshua D. Guttman",
  title = 	 "Strand Spaces:  Why is a Security Protocol Correct?",
  booktitle = 	 "1998 {IEEE} Symposium on Security and Privacy",
  year = 	 1998,
  month =	 "May",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "ThayerHerzogGuttman98a",
  author = 	 "F. Javier {\textsc{Thayer} F\'{a}brega} and Jonathan C. Herzog and Joshua D. Guttman",
  title = 	 "Honest Ideals on Strand Spaces",
  booktitle = 	 "Proceedings of the 11th {IEEE} Computer Security Foundations Workshop",
  year =	 1998,
  month =	 "June",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "ThayerHerzogGuttman98b",
  author = 	 "F. Javier {\textsc{Thayer} F\'{a}brega} and Jonathan C. Herzog and Joshua D. Guttman",
  title = 	 "Strand Space Pictures",
  note = 	 "Presented at the {LICS Workshop on Formal Methods and Security Protocols}",
  month =	 "June",
  year =	 1998
}

Article{
  tag = "ThayerHerzogGuttman99",
  author = 	 "F. Javier Thayer and Jonathan C. Herzog and Joshua D. Guttman",
  title = 	 "Strand Spaces:  Proving Security Protocols Correct",
  journal = 	 "Journal of Computer Security",
  year = 	 1999,
  volume =	 7,
  number =	 "2/3",
  pages =	 "191--230"
}

Article{
  tag = "ThayerHerzogGuttman99a",
  author = 	 "F. Javier Thayer and Jonathan C. Herzog and Joshua D. Guttman",
  title = 	 "Mixed Strand Spaces",
  booktitle = 	 "Proceedings of the 12th {IEEE} Computer Security Foundations Workshop",
  year =	 1999,
  month =	 "June",
  publisher =	 "{IEEE} Computer Society Press"
}

Article{
  tag = "TCGspec01",
  title = 	 "Trusted Computing Group Main Specification",
  key =		 "Trusted Computing Group",
  organization = "Trusted Computing Group",
  edition =	 "Version 1.1b",
  month =	 sep,
  year =	 2001,
  note =	 "URL \url{https://www.trustedcomputinggroup.org/downloads/tcg_spec_1_1b.zip}"
}




Article{
  tag = "TCGArch04",
  title = 	 "TCG Specification Architecture Overview",
  organization = "Trusted Computing Group",
  address =	 "\url{https://www.trustedcomputinggroup.org/downloads/TCG_1_0_Architecture_Overview.pdf}",
  edition =	 "Revision 1.2",
  month =	 "April",
  year =	 2004
}





Article{
  tag = "TCGMainDesign05",
  title = 	 "TPM Main:  Part I Design Principles",
  organization = "Trusted Computing Group",
  address =	 "\url{https://www.trustedcomputinggroup.org/downloads/specifications/mainP1DP_rev85.zip}",
  edition =	 "Specification Version 1.2, Revision 85",
  month =	 "February",
  year =	 2005
}

Article{
  tag = "VixieEtAl97",
  author =	 "P. Vixie and S. Thompson and Y. Rekhter and J. Bound",
  title =	 "Dynamic Updates in the Domain Name System",
  howpublished = "RFC 2136",
  month =	 "April",
  year =	 1997
}

Article{
  tag = "VolpanoEtAl96",
  author = 	 "Dennis Volpano and Geoffrey Smith and Cynthia Irvine",
  title = 	 "A Sound Type System for Secure Flow Analysis",
  journal = 	 "Journal of Computer Security",
  year = 	 1996,
  volume =	 4,
  number =	 3,
  pages =	 "1--21"
}

Article{
  tag = "VoydockKent83",
  author = 	 "Victor L. Voydock and Stephen T. Kent",
  title = 	 "Security Mechanisms in High-Level Network Protocols",
  journal =	 "Computing Surveys",
  year =	 1983,
  volume =	 15,
  number =	 2,
  pages =	 "135--171",
  month =	 jun
}

Article{
  tag = "WagnerSchneier96",
  author = 	 "D. Wagner and B. Schneier",
  title = 	 "Analysis of the {SSL} 3.0 Protocol",
  booktitle = 	 "Proceedings, Second USENIX Workshop on Electronic Commerce",
  pages =	 "29--40",
  year =	 1996,
  note =	 "Available at http://www.counterpane.com/ssl.html"
}

Article{
  tag = "WallachFelten98",
  author = 	 "Daniel S. Wallach and Edward W. Felten",
  title = 	 "Understanding Java Stack Inspection",
  booktitle =	 "{IEEE} Symposium on Security and Privacy",
  pages =	 "52--63",
  year =	 1998
}
                  
Article{
  tag = "Wang2006",
  title= "Generic non-repudiation protocols supporting transparent off-line {TTP}",
  author= "Guilin Wang",
  journal= "Journal of Computer Security",
  volume= "14",
  number= "5",
  pages= "441--467",
  year= "2006",
  publisher= "IOS Press"
}


Article{
  tag = "Wiener93",
title =        "Efficient DES Key Search ",
year =         1993,
series =       "Crypto 93",
month =        aug
}

Article{
  tag = "Willet82",
  author = 	 "Michael Willet",
  title = 	 "Cryptography Old and New",
  journal =	 "Computers and Security",
  volume =	 "Vol 1",
  pages =	 "177--186",
  year =         1982
}

Article{
  tag = "WooLam92",
  author = 	 "T. Y. C. Woo and S. S. Lam",
  title = 	 "Authentication for Distributed Systems",
  journal =	 "Computer",
  year =	 1992,
  volume =	 25,
  number =	 1,
  pages =	 "39--52",
  month =	 jan
}

Article{
  tag = "WooLam92a",
  author = 	 "Thomas Y. C. Woo and Simon S. Lam",
  title = 	 "Authentication for Distributed Systems",
  journal = 	 "Computer",
  year = 	 1992,
  volume =	 25,
  number =	 1,
  pages =	 "39--52",
  month =	 "January"
}

Article{
  tag = "WooLam93",
  author = 	 "Thomas Y. C. Woo and Simon S. Lam",
  title = 	 "Verifying authentication protocols: Methodology and example",
  booktitle = 	 "Proc. Int. Conference on Network Protocols",
  year =	 1993,
  month =	 "October"
}

Article{
  tag = "WooLam94",
  author = 	 "Thomas Y. C. Woo and Simon S. Lam",
  title = 	 "A Lesson on Authentication Protocol Design",
  journal =	 "Operating Systems Review",
  year =	 1994,
  pages =	 "24--37"
}

Article{
  tag = "Wray91",
  author = 	 "John C. Wray",
  title = 	 "An Analysis of Covert Timing Channels",
  booktitle =	 "Proceedings, 1991 {IEEE} Symposium on Research in Security and Privacy",
  pages =	 "2--7",
  year =	 1991,
  month =	 "May",
  organization = "{IEEE} Computer Society"
}

Article{
  tag = "YamaguchiOkayamaMiyahara90",
  author =       "S. Yamaguchi and K. Okayama and H. Miyahara",
  title =        "Design and Implementation of an Authentication System in {WIDE Internet} Environment",
  booktitle =    "Proceedings of the 10th Regional Conference on Computers and Communication Systems",
  year =         1990
}

Article{
  tag = "WoolEtAl00",
  author = 	 "Alain Mayer and Avishai Wool and Elisha Ziskind",
  title = 	 "Fang:  A Firewall Analysis Engine",
  booktitle = 	 "Proceedings, IEEE Symposium on Security and Privacy",
  year =	 2000
}

Article{
  tag = "YasinacWulf93",
  author = 	 "Alec F Yasinsac and William A Wulf",
  title = 	 "A Formal Semantics for Evaluating Cryptographic Protocols",
  note = 	 "The paper has been superceeded by a later version published in the IEEE Symposium on Security and Privacy 1994.",
  year =	 1993
}

Article{
  tag = "SSHArch",
  author =	 "T. Ylonen and T. Kivinen and M. Saarinen",
  title =	 "{SSH} Prototcol Architecture",
  howpublished = "Internet draft",
  month =	 "November",
  year =	 1997,
  note =	 "Also named draft-ietf-secsh-architecture-01.txt"
}

Article{
  tag = "SSHConn",
  author =	 "T. Ylonen and T. Kivinen and M. Saarinen",
  title =	 "{SSH} Connection Prototcol",
  howpublished = "Internet draft",
  month =	 "November",
  year =	 1997,
  note =	 "Also named draft-ietf-secsh-connect-03.txt"
}

Article{
  tag = "SSHTrans",
  author =	 "T. Ylonen and T. Kivinen and M. Saarinen",
  title =	 "{SSH} Transport Layer Prototcol",
  howpublished = "Internet draft",
  month =	 "November",
  year =	 1997,
  note =	 "Also named draft-ietf-secsh-transport-01.txt"
}

Article{
  tag = "SSHAuth",
  author =	 "T. Ylonen and T. Kivinen and M. Saarinen",
  title =	 "{SSH} Authentication Prototcol",
  howpublished = "Internet draft",
  month =	 "November",
  year =	 1997,
  note =	 "Also named draft-ietf-secsh-userauth-01.txt"
}

Article{
  tag = "ReedSimon80",
  author = 	"M. Reed and B. Simon",
  title = 	"Functional Analysis",
  publisher = 	"Academic Press",
  year = 	1980,
  address = 	"Orlando"
}

Article{
  tag = "billingsley1",
  author = 	"Patrick Billingsley Jr.",
  title = 	"Convergence of Probability Measures",
  publisher = 	"John Wiley and Sons",
  year = 	1968,
  address = 	"New York",
}

Article{
  tag = "DaemenRijmen",
    author = "J. Daemen and V. Rijmen",
    title = "The Design of Rijndael",
    publisher = "Springer-Verlag",
    year = 2002,
    address = "Berlin"
}

Article{
  tag = "LincolnEtAl99",
  author = 	 "Lincoln,P.D. and Mitchell, J.C. and Mitchell, M. and Scedrov, A.",
  title = 	 "Probabilistic polynomial-time equivalence and security protocols",
  booktitle = 	 "{FM}'99 World Congress On Formal Methods in the Development of Computing Systems",
  year =	 1999,
  month =	 "September"
}

Article{
  tag = "LincolnEtAl98",
  author = 	 "Lincoln, P.D. and Mitchell, J.C. and Mitchell, M. and Scedrov, A.",
  title = 	 "A Probabilistic Poly-time Framework for Protocol Analysis",
  booktitle = 	 "{ACM} Computer and Communication Security ({CCS}-5)",
  pages =	 "112-121",
  year =	 1998
}

Article{
  tag = "MitchelEtAl98",
  author = 	 "J. C. Mitchell and M. Mitchell and A. Scedrov",
  title = 	 "A linguistic characterization of bounded oracle computation and probabilistic polynomial time",
  booktitle = 	 "{IEEE} Foundations of Computer Science",
  pages =	 "725-733",
  year =	 1998
}

Article{
  tag = "PereiraO2001CSFW",
  author       = "Olivier Pereira and Jean-Jacques Quisquater",
  title        = "A Security Analysis of the Cliques Protocols Suites",
  booktitle    = "14th IEEE Computer Security Foundations Workshop --- CSFW'01",
  year         = 2001,
  pages        = "73--81",
  address      = "Cape Breton, Canada",
  month        = "11--13 June",
  publisher    = "IEEE Computer Society Press"
}

Article{
  tag = "BackesEtAl2003",
  author = 	 "Michael Backes and Birgit Pfitzmann and Michael Waidner",
  title = 	 "A Universally Composable Cryptographic Library",
  note = 	 "Available at \texttt{http://eprint.iacr.org/2003/015/}",
  year =	 2003
}

Article{
  tag = "DBLP:conf/esorics/CortierWZ07",
  author    = "V{\'e}ronique Cortier and Bogdan Warinschi and Eugen Zalinescu",
  title     = "Synthesizing Secure Protocols",
  booktitle = "{ESORICS}:  European Symposium On Research In Computer Security",
  publisher = "Springer",
  series    = "LNCS",
  volume    = "4734",
  year      = 2007,
  pages     = "406-421",
  ee        = "http://dx.doi.org/10.1007/978-3-540-74835-9_27",
  bibsource = "DBLP, http://dblp.uni-trier.de"
}
