-
1
-
-
84954313527
-
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
-
LNCS 2529, Springer-Verlag
-
A. Armando, and L. Compagna Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning Proceedings of FORTE 2002 LNCS 2529 2002 Springer-Verlag 210 225
-
(2002)
Proceedings of FORTE 2002
, pp. 210-225
-
-
Armando, A.1
Compagna, L.2
-
2
-
-
35048841165
-
Abstraction-driven SAT-based Analysis of Security Protocols
-
LNCS 2919. Springer-Verlag
-
A. Armando, and L. Compagna Abstraction-driven SAT-based Analysis of Security Protocols Proceedings of SAT 2003 LNCS 2919 2003 Springer-Verlag Available at http://www.avispa-project.org
-
(2003)
Proceedings of SAT 2003
-
-
Armando, A.1
Compagna, L.2
-
3
-
-
35248876774
-
SAT-based Model-Checking of Security Protocols using Planning Graph Analysis
-
LNCS 2805. Springer-Verlag
-
A. Armando, L. Compagna, and P. Ganty SAT-based Model-Checking of Security Protocols using Planning Graph Analysis Proceedings of FME'2003 LNCS 2805 2003 Springer-Verlag
-
(2003)
Proceedings of FME'2003
-
-
Armando, A.1
Compagna, L.2
Ganty, P.3
-
4
-
-
84937567009
-
The AVISS Security Protocol Analysis Tool
-
LNCS 2404. Springer-Verlag
-
Alessandro Armando, David Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michael Rusinowitch, Mathieu Turuani, Luca Viganò, and Laurent Vigneron The AVISS Security Protocol Analysis Tool Proceedings of CAV'02 LNCS 2404 2002 Springer-Verlag 349 354
-
(2002)
Proceedings of CAV'02
, pp. 349-354
-
-
Alessandro, A.1
David, B.2
Mehdi, B.3
Yannick, C.4
Luca, C.5
Sebastian, M.6
Michael, R.7
Mathieu, T.8
Luca, V.9
Laurent, V.10
-
5
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
Einar Snekkenes Dieter Gollmann, LNCS 2808, Springer-Verlag
-
D. Basin, S. Mödersheim, and L. Viganò An On-The-Fly Model-Checker for Security Protocol Analysis Einar Snekkenes Dieter Gollmann Proceedings of ESORICS'03 LNCS 2808 2003 Springer-Verlag 253 270 Available at http://www.avispa-project.org
-
(2003)
Proceedings of ESORICS'03
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
6
-
-
84944319371
-
Symbolic Model Checking without BDDs
-
W.R. Cleaveland, LNCS 1579, Springer-Verlag Berlin
-
A. Biere, A. Cimatti, E. Clarke, and Y. Zhu Symbolic Model Checking without BDDs W.R. Cleaveland Proceedings of TACAS'99 LNCS 1579 1999 Springer-Verlag Berlin 193 207
-
(1999)
Proceedings of TACAS'99
, pp. 193-207
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.3
Zhu, Y.4
-
7
-
-
0032671775
-
A meta-notation for protocol analysis
-
Iliano Cervesato, N.A. Durgin, Patrick Lincoln, John C. Mitchell, and Andre Scedrov. A meta-notation for protocol analysis. In CSFW, pages 55-69, 1999
-
(1999)
CSFW
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.3
Mitchell, J.C.4
Scedrov, A.5
-
15
-
-
84956860311
-
Compiling and Verifying Security Protocols
-
M. Parigot A. Voronkov, LNCS 1955, Springer-Verlag
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron Compiling and Verifying Security Protocols M. Parigot A. Voronkov Proceedings of LPAR 2000 LNCS 1955 2000 Springer-Verlag 131 160
-
(2000)
Proceedings of LPAR 2000
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
16
-
-
14044269417
-
-
Technical Report Xerox Palo Alto Research Center, Palo Alto, CA, USA Reprinted June 1982
-
R.M. Needham and M.D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. Technical Report CSL-78-4, Xerox Palo Alto Research Center, Palo Alto, CA, USA, 1978. Reprinted June 1982
-
(1978)
Using Encryption for Authentication in Large Networks of Computers
, vol.CSL-78-4
-
-
Needham, R.M.1
Schroeder, M.D.2
|