-
2
-
-
35248848311
-
Computer-Assisted Verification of a Protocol for Certified Email
-
R. Cousot, editor, of LNCS. Springer, June
-
M. Abadi and B. Blanchet. Computer-Assisted Verification of a Protocol for Certified Email. In R. Cousot, editor, Static Analysis, 10th International Symposium (SAS'03), volume 2694 of LNCS, pages 316-335. Springer, June 2003.
-
(2003)
Static Analysis, 10th International Symposium (SAS'03), Volume 2694 of LNCS
, vol.2694
, pp. 316-335
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
17644411480
-
Mobile Values, New Names, and Secure Communication
-
ACM, Jan.
-
M. Abadi and C. Fournet. Mobile Values, New Names, and Secure Communication. In 28th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01), pages 104-115. ACM, Jan. 2001.
-
(2001)
28th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01)
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
0003092378
-
A Calculus for Cryptographic Protocols: The Spi Calculus
-
Jan. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998
-
M. Abadi and A. D. Gordon. A Calculus for Cryptographic Protocols: The Spi Calculus. Information and Computation, 148(1):1-70, Jan. 1999. An extended version appeared as Digital Equipment Corporation Systems Research Center report No. 149, January 1998.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
84958749546
-
From Secrecy to Authenticity in Security Protocols
-
M. Hermenegildo and G. Puebla, editors. Springer, Sept.
-
B. Blanchet. From Secrecy to Authenticity in Security Protocols. In M. Hermenegildo and G. Puebla, editors, 9th International Static Analysis Symposium (SAS'02), volume 2477 of LNCS, pages 342-359. Springer, Sept. 2002.
-
(2002)
9th International Static Analysis Symposium (SAS'02), Volume 2477 of LNCS
, vol.2477
, pp. 342-359
-
-
Blanchet, B.1
-
7
-
-
35248878042
-
Verification of Cryptographic Protocols: Tagging Enforces Termination
-
A. Gordon, editor. Springer, Apr.
-
B. Blanchet and A. Podelski. Verification of Cryptographic Protocols: Tagging Enforces Termination. In A. Gordon, editor, Foundations of Software Science and Computation Structures (FoSSaCS'03), volume 2620 of LNCS, pages 136-152. Springer, Apr. 2003.
-
(2003)
Foundations of Software Science and Computation Structures (FoSSaCS'03), Volume 2620 of LNCS
, vol.2620
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
8
-
-
84947780217
-
New decidability results for fragments of first-order logic and application to cryptographic protocols
-
R. Nieuwenhuis, editor. Springer, June
-
H. Comon-Lundh and V. Cortier. New decidability results for fragments of first-order logic and application to cryptographic protocols. In R. Nieuwenhuis, editor, In Proc. 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), volume 2706 of LNCS. Springer, June 2003.
-
(2003)
Proc. 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), Volume 2706 of LNCS
, vol.2706
-
-
Comon-Lundh, H.1
Cortier, V.2
-
9
-
-
0020720357
-
On the security of public key protocols
-
Mar.
-
D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(12):198-208, Mar. 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.12
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
11
-
-
35248840989
-
Handling Encryption in an Analysis for Secure Information Flow
-
P. Degano, editor. Springer, Apr.
-
P. Laud. Handling Encryption in an Analysis for Secure Information Flow. In P. Degano, editor, Programming Languages and Systems, 12th European Symposium on Programming, ESOP'03, volume 2618 of LNCS, pages 159-173. Springer, Apr. 2003.
-
(2003)
Programming Languages and Systems, 12th European Symposium on Programming, ESOP'03, Volume 2618 of LNCS
, vol.2618
, pp. 159-173
-
-
Laud, P.1
-
13
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
Dec.
-
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Commun. ACM, 21(12):993-999, Dec. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
14
-
-
84957640213
-
Towards an Automatic Analysis of Security Protocols in First-Order Logic
-
H. Ganzinger, editor. Springer, July
-
C. Weidenbach. Towards an Automatic Analysis of Security Protocols in First-Order Logic. In H. Ganzinger, editor, 16th International Conference on Automated Deduction (CADE-16), volume 1632 of LNAI, pages 314-328. Springer, July 1999.
-
(1999)
16th International Conference on Automated Deduction (CADE-16), Volume 1632 of LNAI
, vol.1632
, pp. 314-328
-
-
Weidenbach, C.1
|