doc-src/manual.bib
changeset 11246 64d0bcccb03a
parent 11209 a8cb33f6cf9c
child 11268 a8b8d59899fd
     1.1 --- a/doc-src/manual.bib	Mon Apr 09 14:49:51 2001 +0200
     1.2 +++ b/doc-src/manual.bib	Tue Apr 10 15:58:50 2001 +0200
     1.3 @@ -27,7 +27,9 @@
     1.4  @string{JLP="Journal of Logic Programming"}
     1.5  @string{JSC="Journal of Symbolic Computation"}
     1.6  @string{JSL="Journal of Symbolic Logic"}
     1.7 +@string{PROYAL="Proceedings of the Royal Society of London"}
     1.8  @string{SIGPLAN="{SIGPLAN} Notices"}
     1.9 +@string{TISSEC="ACM Transactions on Information and System Security"}
    1.10  
    1.11  %conferences
    1.12  @string{CADE="International Conference on Automated Deduction"}
    1.13 @@ -181,6 +183,14 @@
    1.14    pages		= {381-392},
    1.15    year		= 1972}
    1.16  
    1.17 +@Article{ban89,
    1.18 +  author	= {M. Burrows and M. Abadi and R. M. Needham},
    1.19 +  title		= {A Logic of Authentication},
    1.20 +  journal	= PROYAL,
    1.21 +  year		= 1989,
    1.22 +  volume	= 426,
    1.23 +  pages		= {233-271}}
    1.24 +
    1.25  %C
    1.26  
    1.27  @TechReport{camilleri92,
    1.28 @@ -485,6 +495,21 @@
    1.29    publisher	= NH,
    1.30    year		= 1980}
    1.31  
    1.32 +%L
    1.33 +
    1.34 +@InProceedings{lowe-fdr,
    1.35 +  author	= {Gavin Lowe},
    1.36 +  title		= {Breaking and Fixing the {Needham}-{Schroeder} Public-Key
    1.37 +		  Protocol using {CSP} and {FDR}},
    1.38 +  booktitle = 	 {Tools and Algorithms for the Construction and Analysis 
    1.39 +                  of Systems:  second international workshop, TACAS '96},
    1.40 +  editor =	 {T. Margaria and B. Steffen},
    1.41 +  series =	 {LNCS 1055},
    1.42 +  year =	 1996,
    1.43 +  publisher =	 {Springer},
    1.44 +  pages		= {147-166}}
    1.45 +
    1.46 +
    1.47  %M
    1.48  
    1.49  @Article{mw81,
    1.50 @@ -592,6 +617,17 @@
    1.51    pages		= {331-345},
    1.52    year		= 1996}
    1.53  
    1.54 +@Article{needham-schroeder,
    1.55 +  author =       "Roger M. Needham and Michael D. Schroeder",
    1.56 +  title =        "Using Encryption for Authentication in Large Networks
    1.57 +                 of Computers",
    1.58 +  journal =      cacm,
    1.59 +  volume =       21,
    1.60 +  number =       12,
    1.61 +  pages =        "993-999",
    1.62 +  month =        dec,
    1.63 +  year =         1978}
    1.64 +
    1.65  @inproceedings{nipkow-W,
    1.66    author	= {Wolfgang Naraschewski and Tobias Nipkow},
    1.67    title		= {Type Inference Verified: Algorithm {W} in {Isabelle/HOL}},
    1.68 @@ -872,6 +908,17 @@
    1.69    volume	= 6,
    1.70    pages		= {85-128}}
    1.71  
    1.72 +@Article{paulson-tls,
    1.73 +  author = 	 {Lawrence C. Paulson},
    1.74 +  title = 	 {Inductive Analysis of the {Internet} Protocol {TLS}},
    1.75 +  journal = 	 TISSEC,
    1.76 +  month =        aug,
    1.77 +  year = 	 1999,
    1.78 +  volume	= 2,
    1.79 +  number        = 3,
    1.80 +  pages		= {332-351}}
    1.81 +
    1.82 +
    1.83  @article{pelletier86,
    1.84    author	= {F. J. Pelletier},
    1.85    title		= {Seventy-five Problems for Testing Automatic Theorem