-
2
-
-
84874678490
-
On name generation and set-based analysis in Dolev-Yao model
-
Springer, Berlin
-
R.M. Amadio and W. Charatonik, On name generation and set-based analysis in Dolev-Yao model, in: CONCUR 2002, Volume 2421 of Lecture Notes in Computer Science, Springer, Berlin, 2002, pp. 499-514.
-
(2002)
CONCUR 2002, Volume 2421 of Lecture Notes in Computer Science
, vol.2421
, pp. 499-514
-
-
Amadio, R.M.1
Charatonik, W.2
-
3
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
R.M. Amadio, D. Lugiez and V. Vanackère, On the symbolic reduction of processes with cryptographic functions, Theoretical Computer Science 290(1) (2002), 695-740.
-
(2002)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 695-740
-
-
Amadio, R.M.1
Lugiez, D.2
Vanackère, V.3
-
4
-
-
19144369108
-
Programming Satan's computer
-
Springer, Berlin
-
R. Anderson and R.M. Needham, Programming Satan's computer, in: Computer Science Today, Volume 1000 of Lecture Notes in Computer Science, Springer, Berlin, 1995, pp. 426-441.
-
(1995)
Computer Science Today, Volume 1000 of Lecture Notes in Computer Science
, vol.1000
, pp. 426-441
-
-
Anderson, R.1
Needham, R.M.2
-
5
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
A.D. Gordon, ed., Volume 2620 of Lecture Notes in Computer Science, Springer, Berlin
-
B. Blanchet and A. Podelski, Verification of cryptographic protocols: tagging enforces termination, in: Proceedings of FoSSaCS'03, A.D. Gordon, ed., Volume 2620 of Lecture Notes in Computer Science, Springer, Berlin, 2003, pp. 136-152.
-
(2003)
Proceedings of FoSSaCS'03
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
6
-
-
0012013903
-
Dolev-Yao is no better than Machiavelli
-
P. Degano, ed.
-
I. Cervesato, C.A. Meadows and P.F. Syverson, Dolev-Yao is no better than Machiavelli, in: Proceedings of WITS'00, P. Degano, ed., 2000.
-
(2000)
Proceedings of WITS'00
-
-
Cervesato, I.1
Meadows, C.A.2
Syverson, P.F.3
-
8
-
-
35248897454
-
Tree automata with one memory, set constraints, and ping-pong protocols
-
Springer, Berlin
-
H. Comon, V. Cortier and J.C. Mitchell, Tree automata with one memory, set constraints, and ping-pong protocols, in: Proceedings of ICALP 2001, Volume 2076 of Lecture Notes in Computer Science, Springer, Berlin, 2001.
-
(2001)
Proceedings of ICALP 2001, Volume 2076 of Lecture Notes in Computer Science
, vol.2076
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.C.3
-
13
-
-
0035067667
-
Fault-preserving simplifying transformations for security protocols
-
ML. Hui and G. Lowe, Fault-preserving simplifying transformations for security protocols, Journal of Computer Security 9(1, 2) (2001), 3-46.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.1-2
, pp. 3-46
-
-
Hui, M.L.1
Lowe, G.2
-
14
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public key protocol using FDR
-
Springer, Berlin
-
G. Lowe, Breaking and fixing the Needham-Schroeder public key protocol using FDR, in: Proceedings of TACAS'96, Volume 1055 of Lecture Notes in Computer Science, Springer, Berlin, 1996, pp. 147-166.
-
(1996)
Proceedings of TACAS'96, Volume 1055 of Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
15
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
G. Lowe, Towards a completeness result for model checking of security protocols, Journal of Computer Security 7 (1999), 89-146.
-
(1999)
Journal of Computer Security
, vol.7
, pp. 89-146
-
-
Lowe, G.1
-
17
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
18
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L.C. Paulson, The inductive approach to verifying cryptographic protocols, Journal of Computer Security 6 (1998), 85-128.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
19
-
-
11944263324
-
A decidable subclass of unbounded security protocols
-
R. Gorrieri, ed.
-
R. Ramanujam and S.P. Suresh, A decidable subclass of unbounded security protocols, in: Proceedings of WITS'03, R. Gorrieri, ed., 2003, pp. 11-20.
-
(2003)
Proceedings of WITS'03
, pp. 11-20
-
-
Ramanujam, R.1
Suresh, S.P.2
-
20
-
-
11944256048
-
An equivalence on terms for security protocols
-
R. Bharadwaj, ed.
-
R. Ramanujam and S.P. Suresh, An equivalence on terms for security protocols, in: Proceedings of AVIS'03, R. Bharadwaj, ed., 2003, pp. 45-56.
-
(2003)
Proceedings of AVIS'03
, pp. 45-56
-
-
Ramanujam, R.1
Suresh, S.P.2
-
21
-
-
35248886574
-
Tagging makes secrecy decidable for unbounded nonces as well
-
P.K. Pandya and J. Radhakrishnan, eds, Volume 2914 of Lecture Notes in Computer Science, Springer, Berlin
-
R. Ramanujam and S.P. Suresh, Tagging makes secrecy decidable for unbounded nonces as well, in: Proceedings of 23rd FST&TCS, P.K. Pandya and J. Radhakrishnan, eds, Volume 2914 of Lecture Notes in Computer Science, Springer, Berlin, 2003, pp. 363-374.
-
(2003)
Proceedings of 23rd FST&TCS
, pp. 363-374
-
-
Ramanujam, R.1
Suresh, S.P.2
-
23
-
-
0037453396
-
Protocol insecurity with finite number of sessions is NP-complete
-
M. Rusinowitch and M. Turuani, Protocol insecurity with finite number of sessions is NP-complete, Theoretical Computer Science, 299 (2003), 451-475.
-
(2003)
Theoretical Computer Science
, vol.299
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
-
24
-
-
11944274424
-
-
PhD thesis, The Institute of Mathematical Sciences, Chennai, India, November (submitted to Madras University)
-
S.P. Suresh, Foundations of security protocol analysis, PhD thesis, The Institute of Mathematical Sciences, Chennai, India, November 2003 (submitted to Madras University).
-
(2003)
Foundations of Security Protocol Analysis
-
-
Suresh, S.P.1
-
25
-
-
0002508587
-
A lesson on authentication protocol design
-
T.YC. Woo and S.S. Lam, A lesson on authentication protocol design, Operating Systems Review 28(3) (1994), 24-37.
-
(1994)
Operating Systems Review
, vol.28
, Issue.3
, pp. 24-37
-
-
Woo, T.Y.C.1
Lam, S.S.2
|