-
1
-
-
84874678490
-
On name generation and set-based analysis in the Dolev-Yao Model
-
L. Brim, P. Jancar, M. Kretinsky, A. Kucera (Eds.), 13th Internat. Conf. on Concurrency Theory (CONCUR 2002) Springer, Berlin
-
R.M. Amadio, W. Charatonik, On name generation and set-based analysis in the Dolev-Yao Model, in: L. Brim, P. Jancar, M. Kretinsky, A. Kucera (Eds.), 13th Internat. Conf. on Concurrency Theory (CONCUR 2002), Lecture Notes in Computer Science, Vol. 2421, Springer, Berlin, 2002, pp. 499-514.
-
(2002)
Lecture Notes in Computer Science
, vol.2421
, pp. 499-514
-
-
Amadio, R.M.1
Charatonik, W.2
-
2
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
C. Palamidessi (Ed.) 11th Internat. Conf., Lecture Notes in Computer Science Springer, Berlin
-
R. Amadio, D. Lugiez, On the reachability problem in cryptographic protocols, in: C. Palamidessi (Ed.), Proc. CONCUR 2000 - Concurrency Theory, 11th Internat. Conf., Lecture Notes in Computer Science, Vol. 1877, Springer, Berlin, 2000, pp. 380-394.
-
(2000)
Proc. CONCUR 2000 - Concurrency Theory
, vol.1877
, pp. 380-394
-
-
Amadio, R.1
Lugiez, D.2
-
3
-
-
35248876774
-
SAT-based model-checking of security protocols using planning graph analysis
-
Lecture Notes in Computer Science Springer, Berlin
-
A. Armando, L. Compagna, P. Ganty, SAT-based model-checking of security protocols using planning graph analysis, in: Proc. 12th Internat. FME Symp. (FME 2003), Lecture Notes in Computer Science, Vol. 2885, Springer, Berlin, 2003, pp. 875-893.
-
(2003)
Proc. 12th Internat. FME Symp. (FME 2003)
, vol.2885
, pp. 875-893
-
-
Armando, A.1
Compagna, L.2
Ganty, P.3
-
4
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
E. Snekkenes, D. Gollmann (Eds.) Lecture Notes in Computer Science Springer, Berlin
-
D. Basin, S. Mödersheim, L. Viganò, An on-the-fly model-checker for security protocol analysis, in: E. Snekkenes, D. Gollmann (Eds.), Proc. Eighth European Symp. on Research in Computer Security (ESORICS 2003), Lecture Notes in Computer Science, Vol. 2808, Springer, Berlin, 2003, pp. 253-270.
-
(2003)
Proc. Eighth European Symp. on Research in Computer Security (ESORICS 2003)
, vol.2808
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
5
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
Automata, Languages and Programming, 28th Internat. Colloq. (ICALP 2001) Springer, Berlin
-
M. Boreale, Symbolic trace analysis of cryptographic protocols, in: Automata, Languages and Programming, 28th Internat. Colloq. (ICALP 2001), Lecture Notes in Computer Science, Vol. 2076, Springer, Berlin, 2001, pp. 667-681.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
6
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
Lecture Notes in Computer Science 2003, IEEE, Computer Society Press
-
Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, An NP decision procedure for protocol insecurity with XOR, in: Proc. 18th Ann. IEEE Symp. on Logic in Computer Science, Lecture Notes in Computer Science 2003, IEEE, Computer Society Press, 2003, pp. 261-270.
-
(2003)
Proc. 18th Ann. IEEE Symp. on Logic in Computer Science
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
7
-
-
35248865266
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
P.K. Pandya, J. Radhakrishnan (Eds.), FSTTCS 2003: Foundations of Software Technology and Theoretical Computer Science Springer, Berlin
-
Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: P.K. Pandya, J. Radhakrishnan (Eds.), FSTTCS 2003: Foundations of Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, Vol. 2914, Springer, Berlin, 2003, pp. 124-135.
-
(2003)
Lecture Notes in Computer Science
, vol.2914
, pp. 124-135
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
8
-
-
18544366546
-
Deciding the security of protocols with commuting public key encryption
-
ENTCS
-
Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, Deciding the security of protocols with commuting public key encryption, in: IJCAR 2004 Workshop W6 ARSPA Automated Reasoning for Security Protocol Analysis, 2004, ENTCS.
-
(2004)
IJCAR 2004 Workshop W6 ARSPA Automated Reasoning for Security Protocol Analysis
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
9
-
-
84937559950
-
Automated unbounded verification of security protocols
-
Lecture Notes in Computer Science Springer, Berlin
-
Y. Chevalier, L. Vigneron, Automated unbounded verification of security protocols, in: Proc. 14th Internat. Conf. on Computer Aided Verification (CAV 2002), Lecture Notes in Computer Science, Vol. 2404, Springer, Berlin, 2002, pp. 324-337.
-
(2002)
Proc. 14th Internat. Conf. on Computer Aided Verification (CAV 2002)
, vol.2404
, pp. 324-337
-
-
Chevalier, Y.1
Vigneron, L.2
-
11
-
-
35248897454
-
Tree automata with one memory, set constraints, and ping-pong protocols
-
Automata, Languages and Programming, 28th Internat. Colloq. (ICALP 2001)
-
H. Comon, V. Cortier, J. Mitchell, Tree automata with one memory, set constraints, and ping-pong protocols, in: Automata, Languages and Programming, 28th Internat. Colloq. (ICALP 2001), Lecture Notes in Computer Science, Vol. 2076, 2001, pp. 682-693.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
, pp. 682-693
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.3
-
12
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
Lecture Notes in Computer Science 2003, IEEE, Computer Society Press
-
H. Comon-Lundh, V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, in: Proc. 18th Ann. IEEE Symp. on Logic in Computer Science, Lecture Notes in Computer Science 2003, IEEE, Computer Society Press, 2003, pp. 271-280.
-
(2003)
Proc. 18th Ann. IEEE Symp. on Logic in Computer Science
, pp. 271-280
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
13
-
-
0020720357
-
On the security of public-key protocols
-
D. Dolev, and A.C. Yao On the security of public-key protocols IEEE Trans. Inform. Theory 29 2 1983 198 208
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
14
-
-
0003515826
-
Undecidability of bounded security protocols
-
N.A. Durgin, P.D. Lincoln, J.C. Mitchell, A. Scedrov, Undecidability of bounded security protocols, in: Workshop on Formal Methods and Security Protocols (FMSP'99), 1999.
-
(1999)
Workshop on Formal Methods and Security Protocols (FMSP'99)
-
-
Durgin, N.A.1
Lincoln, P.D.2
Mitchell, J.C.3
Scedrov, A.4
-
15
-
-
0034829105
-
Computing symbolic models for verifying cryptographic protocols
-
IEEE, Computer Society Press
-
M.P. Fiore, and M. Abadi Computing symbolic models for verifying cryptographic protocols 14th Computer Security Foundations Workshop (CSFW-14) 2001 IEEE, Computer Society Press 160 173
-
(2001)
14th Computer Security Foundations Workshop (CSFW-14)
, pp. 160-173
-
-
Fiore, M.P.1
Abadi, M.2
-
16
-
-
51149098006
-
An E-unification algorithm for analysing protocols that use modular exponentiation
-
R. Nieuwenhuis (Ed.) Lecture Notes in Computer Science Springer
-
D. Kapur, P. Narendran, L. Wang, An E-unification Algorithm for Analysing Protocols that Use Modular Exponentiation, in: R. Nieuwenhuis (Ed.), Proc. 14th Internat. Conf. on Rewriting Techniques and Applications (RTA 2003), Lecture Notes in Computer Science, Vol. 2706, Springer, 2003, pp. 165-179.
-
(2003)
Proc. 14th Internat. Conf. on Rewriting Techniques and Applications (RTA 2003)
, vol.2706
, pp. 165-179
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
17
-
-
84874721799
-
On the decidability of cryptographic protocols with open-ended data structures
-
L. Brim, P. Jancar, M. Kretinsky, A. Kucera (Eds.), 13th Internat. Conf. on Concurrency Theory (CONCUR 2002) Springer, Berlin
-
R. Küsters, On the decidability of cryptographic protocols with open-ended data structures, in: L. Brim, P. Jancar, M. Kretinsky, A. Kucera (Eds.), 13th Internat. Conf. on Concurrency Theory (CONCUR 2002), Lecture Notes in Computer Science, Vol. 2421, Springer, Berlin, 2002, pp. 515-530.
-
(2002)
Lecture Notes in Computer Science
, vol.2421
, pp. 515-530
-
-
Küsters, R.1
-
18
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe An attack on the Needham-Schroeder public-key authentication protocol Inform. Process. Lett. 56 1995 131 133
-
(1995)
Inform. Process. Lett.
, vol.56
, pp. 131-133
-
-
Lowe, G.1
-
19
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems (TACAS 1996) Springer, Berlin
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Tools and Algorithms for the Construction and Analysis of Systems (TACAS 1996), Lecture Notes in Computer Science, Vol. 1055, Springer, Berlin, 1996, pp. 147-166.
-
(1996)
Lecture Notes in Computer Science
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
20
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
G. Lowe Towards a completeness result for model checking of security protocols J. Comput. Security 7 2-3 1999 89 146
-
(1999)
J. Comput. Security
, vol.7
, Issue.2-3
, pp. 89-146
-
-
Lowe, G.1
-
23
-
-
85084160482
-
Finite-state analysis of ssl 3.0
-
J.C. Mitchell, V. Shmatikov, U. Stern, Finite-state analysis of ssl 3.0, in: Seventh USENIX Security Symposium, 1998, pp. 201-216.
-
(1998)
Seventh USENIX Security Symposium
, pp. 201-216
-
-
Mitchell, J.C.1
Shmatikov, V.2
Stern, U.3
-
24
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham, and M. Schroeder Using encryption for authentication in large networks of computers Commun. ACM 21 12 1978 993 999
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
28
-
-
0002219322
-
An attack on a recursive authentication protocol
-
P.Y.A. Ryan, and S.A. Schneider An attack on a recursive authentication protocol Inform. Process. Lett. 65 1 1998 7 10
-
(1998)
Inform. Process. Lett.
, vol.65
, Issue.1
, pp. 7-10
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
29
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
D.X. Song, S. Berezin, and A. Perrig Athena a novel approach to efficient automatic security protocol analysis J. Comput. Security 9 1/2 2001 47 74
-
(2001)
J. Comput. Security
, vol.9
, Issue.12
, pp. 47-74
-
-
Song, D.X.1
Berezin, S.2
Perrig, A.3
|