#### Filter Results:

- Full text PDF available (34)

#### Publication Year

1991

2018

- This year (3)
- Last 5 years (17)
- Last 10 years (44)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
- Journal of Computer Security
- 2005

Many authentication and key exchange protocols are built using an accepted set of standard concepts such as Diffieâ€“Hellman key exchange, nonces to avoid replay, certificates from an acceptedâ€¦ (More)

- Bob Coecke, Dusko Pavlovic
- 2008

Sums play a prominent role in the formalisms of quantum mechanics, be it for mixing and superposing states, or for composing state spaces. Surprisingly, a conceptual analysis of quantum measurementâ€¦ (More)

- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
- CSFW
- 2003

A â†’ B: m, A B â†’ A: n, sigB {m, n, A} A â†’ B: sigA {m, n, B} Shared secret (with someone) Authenticated A deduces: Received (B, msg1) Î› Sent (B, msg2) Derivation Framework Protocols are constructedâ€¦ (More)

- Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic
- Journal of Computer Security
- 2003

We present a logic for proving security properties of protoc ls that use nonces (randomly generated numbers that uniquely identify a protocol session) and public-key cryptography. The logic, designedâ€¦ (More)

- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
- FMSE
- 2003

Modular composition of security mechanisms is complicated by the way that one mechanism may reveal information that interferes with the security of another. We develop methods for modular reasoningâ€¦ (More)

- Iliano Cervesato, Catherine A. Meadows, Dusko Pavlovic
- 18th IEEE Computer Security Foundations Workshopâ€¦
- 2005

Authentication and secrecy properties are proved by very different methods: the former by local reasoning, leading to matching knowledge of all principals about the order of their actions, the latterâ€¦ (More)

- Dusko Pavlovic, Michael W. Mislove, James Worrell
- AMAST
- 2006

We propose a methodology based on testing as a framework to capture the interactions of a machine represented in a denotational model and the data it manipulates. Using a duality that models machinesâ€¦ (More)

- Nancy A. Durgin, John C. Mitchell, Dusko Pavlovic
- CSFW
- 2001

We present a specialized protocol logic that is built around a process language for describing the actions of a protocol. In general terms, the relation between logic and protocol is like theâ€¦ (More)

- Bob Coecke, Dusko Pavlovic, Jamie Vicary
- Mathematical Structures in Computer Science
- 2013

We show that an orthogonal basis for a finite-dimensional Hilbert space can be equivalently characterised as a commutative â€ -Frobenius monoid in the category FdHilb, which has finite-dimensionalâ€¦ (More)

- Catherine A. Meadows, Dusko Pavlovic
- ESORICS
- 2004

As a part of a continued effort towards a logical framework for incremental reasoning about security, we attempte d a derivational reconstruction of GDOI, the protocol proposed in IETF RFC 3547 forâ€¦ (More)