-
1
-
-
84874678490
-
On name generation and set-based analysis in the Dolev-Yao model
-
13th International Conference on Concurrency Theory (CONCUR), Springer-Verlag
-
R. Amadio, and W. Charatonik On name generation and set-based analysis in the Dolev-Yao model 13th International Conference on Concurrency Theory (CONCUR) LNCS 2421 2002 Springer-Verlag 499 514
-
(2002)
LNCS
, vol.2421
, pp. 499-514
-
-
Amadio, R.1
Charatonik, W.2
-
2
-
-
0009858375
-
Resolution theorem proving
-
J.A. Robinson A. Voronkov North-Holland
-
L. Bachmair, and H. Ganzinger Resolution theorem proving J.A. Robinson A. Voronkov Handbook of Automated Reasoning 2001 North-Holland 19 99 (Chapter 2).
-
(2001)
Handbook of Automated Reasoning
, pp. 19-99
-
-
Bachmair, L.1
Ganzinger, H.2
-
4
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
IEEE Computer Society Press
-
B. Blanchet An efficient cryptographic protocol verifier based on Prolog rules 14th IEEE Computer Security FoundationsWorkshop (CSFW-14) 2001 IEEE Computer Society Press 82 96
-
(2001)
14th IEEE Computer Security FoundationsWorkshop (CSFW-14)
, pp. 82-96
-
-
Blanchet, B.1
-
5
-
-
35248865266
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
P. Pandya J. Radhakrishnan, 23rd Intl. Conf. Foundations of Software Technology and Theoretical Computer Science (FST & TCS), Mumbai, India, Springer-Verlag
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents P. Pandya J. Radhakrishnan 23rd Intl. Conf. Foundations of Software Technology and Theoretical Computer Science (FST & TCS), Mumbai, India LNCS 2003. Springer-Verlag
-
(2003)
LNCS
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
6
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
P. Kolaitis IEEE Computer Society Press
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani An NP decision procedure for protocol insecurity with XOR P. Kolaitis 18th Intl. Symp. Logic in Computer Science (LICS'03), Ottawa, Canada 2003. IEEE Computer Society Press
-
(2003)
18th Intl. Symp. Logic in Computer Science (LICS'03), Ottawa, Canada
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
7
-
-
35248897454
-
Tree automata with one memory, set constraints and ping-pong protocols
-
28th International Conference on Automata, Languages and Programming (ICALP), Springer-Verlag
-
H. Comon, V. Cortier, and J. Mitchell Tree automata with one memory, set constraints and ping-pong protocols 28th International Conference on Automata, Languages and Programming (ICALP) LNCS 2076 2001 Springer-Verlag 682 693
-
(2001)
LNCS
, vol.2076
, pp. 682-693
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.3
-
8
-
-
0004060205
-
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi Tree automata techniques and applications 1997 http://www.grappa.univ-lille3.fr/tata
-
(1997)
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Lugiez, D.5
Tison, S.6
Tommasi, M.7
-
9
-
-
14844290049
-
Is it possible to decide whether a cryptographic protocol is secure or not?
-
J. Goubault-Larrecq, Special Issue on Models and Methods for Cryptographic Protocol Verification, Instytut Ła̧ csności (Institute of Telecommunications) Warsaw, Poland
-
H. Comon, and V. Shmatikov Is it possible to decide whether a cryptographic protocol is secure or not? J. Goubault-Larrecq Journal of Telecommunications and Information Technology Special Issue on Models and Methods for Cryptographic Protocol Verification vol. 4 2002 Instytut Ła̧ csności (Institute of Telecommunications) Warsaw, Poland 3 13
-
(2002)
Journal of Telecommunications and Information Technology
, vol.4
, pp. 3-13
-
-
Comon, H.1
Shmatikov, V.2
-
10
-
-
1442267739
-
Security properties: Two agents are sufficient
-
LSV, ENS Cachan
-
H. Comon-Lundh, V. Cortier, Security properties: Two agents are sufficient, Research Report LSV-02-10, LSV, ENS Cachan, 2002, 26 p.
-
(2002)
Research Report
, vol.LSV-02-10
, pp. 26
-
-
Comon-Lundh, H.1
Cortier, V.2
-
11
-
-
84947780217
-
New decidability results for fragments of first-order logic and application to cryptographic protocols
-
R. Nieuwenhuis, 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain, Springer-Verlag
-
H. Comon-Lundh, and V. Cortier New decidability results for fragments of first-order logic and application to cryptographic protocols R. Nieuwenhuis 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain LNCS 2706 2003 Springer-Verlag 148 164
-
(2003)
LNCS
, vol.2706
, pp. 148-164
-
-
Comon-Lundh, H.1
Cortier, V.2
-
12
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
P. Kolaitis IEEE Computer Society Press
-
H. Comon-Lundh, and V. Shmatikov Intruder deductions, constraint solving and insecurity decision in presence of exclusive or P. Kolaitis 18th Intl. Symp. Logic in Computer Science (LICS'03), Ottawa, Canada 2003 IEEE Computer Society Press 271 280
-
(2003)
18th Intl. Symp. Logic in Computer Science (LICS'03), Ottawa, Canada
, pp. 271-280
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
13
-
-
0000911801
-
Abstract interpretation and application to logic programs
-
P. Cousot, and R. Cousot Abstract interpretation and application to logic programs Journal of Logic Programming 13 2-3 1992 103 179 Correctversionat http://www.dmi.ens.fr/~cousot/COUSOTpapers/JLP92.shtml.
-
(1992)
Journal of Logic Programming
, vol.13
, Issue.2-3
, pp. 103-179
-
-
Cousot, P.1
Cousot, R.2
-
15
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev, and A.C. Yao On the security of public key protocols IEEE Trans. Inform. Theory, IT 29 2 1983 198 208
-
(1983)
IEEE Trans. Inform. Theory, IT
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
16
-
-
85034750377
-
Associative-commutative unification
-
R.E. Shostak, 7th Int. Conf. on Automated Deduction (CADE), Napa Valley, California, US, Springer-Verlag
-
F. Fagès Associative-commutative unification R.E. Shostak 7th Int. Conf. on Automated Deduction (CADE), Napa Valley, California, US LNCS 170 1984 Springer-Verlag 194 208
-
(1984)
LNCS
, vol.170
, pp. 194-208
-
-
Fagès, F.1
-
17
-
-
0002612248
-
Resolution decision procedures
-
J.A. Robinson A. Voronkov North-Holland
-
C. Fermüller, A. Leitsch, U. Hustadt, and T. Tammet Resolution decision procedures J.A. Robinson A. Voronkov Handbook of Automated Reasoning, vol. II 2001 North-Holland 1791 1849 (Chapter 25)
-
(2001)
Handbook of Automated Reasoning, Vol. II
, pp. 1791-1849
-
-
Fermüller, C.1
Leitsch, A.2
Hustadt, U.3
Tammet, T.4
-
19
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
17th Int. Conf. on Automated Deduction (CADE), Pittsburgh, PA, Springer-Verlag
-
T. Genet, and F. Klay Rewriting for cryptographic protocol verification 17th Int. Conf. on Automated Deduction (CADE), Pittsburgh, PA LNAI 1831 2000 Springer-Verlag 271 290
-
(2000)
LNAI
, vol.1831
, pp. 271-290
-
-
Genet, T.1
Klay, F.2
-
21
-
-
84876354671
-
A method for automatic cryptographic protocol verification (extended abstract)
-
Int. Workshop on Formal Methods in Parallel Programming, Theory and Applications (FMPPTA), Springer-Verlag
-
J. Goubault-Larrecq A method for automatic cryptographic protocol verification (extended abstract) Int. Workshop on Formal Methods in Parallel Programming, Theory and Applications (FMPPTA) LNCS 1800 2000 Springer-Verlag 977 984
-
(2000)
LNCS
, vol.1800
, pp. 977-984
-
-
Goubault-Larrecq, J.1
-
22
-
-
84947786510
-
Higher-order positive set constraints
-
16th Int. Workshop Computer Science Logic (CSL), Edinburgh, Scotland, Springer-Verlag
-
J. Goubault-Larrecq Higher-order positive set constraints 16th Int. Workshop Computer Science Logic (CSL), Edinburgh, Scotland LNCS 2471 2002 Springer-Verlag 473 489
-
(2002)
LNCS
, vol.2471
, pp. 473-489
-
-
Goubault-Larrecq, J.1
-
23
-
-
13944273253
-
Vérification de protocoles cryptographiques: La logique à la rescousse!
-
J. Goubault-Larrecq (Ed.) INRIA, collection didactique
-
J. Goubault-Larrecq, Vérification de protocoles cryptographiques: la logique à la rescousse!, in: J. Goubault-Larrecq (Ed.), Actes du 1er workshop international sur la sécurité des communications sur Internet (SECI'02), INRIA, collection didactique, 2002, pp. 119-152.
-
(2002)
Actes du 1er Workshop International sur la Sécurité des Communications sur Internet (SECI'02)
, pp. 119-152
-
-
Goubault-Larrecq, J.1
-
25
-
-
20144382303
-
Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve?
-
V. Ménissier-Morain (Ed.) INRIA, collection didactique
-
J. Goubault-Larrecq, Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve? in: V. Ménissier-Morain (Ed.), Actes des 12èmes Journées Francophones des Langages Applicatifs (JFLA'04), INRIA, collection didactique, 2004.
-
(2004)
Actes des 12èmes Journées Francophones des Langages Applicatifs (JFLA'04)
-
-
Goubault-Larrecq, J.1
-
26
-
-
18944382537
-
Alternating two-way AC-tree automata
-
LSV
-
J. Goubault-Larrecq, K.N. Verma, Alternating two-way AC-tree automata, Research Report LSV-02-11, LSV, 2002, Available from: http://www.lsv.ens-cachan. fr/Publis/RAPPORTS_LSV/rr-lsv-2002-11.rr.ps.
-
(2002)
Research Report
, vol.LSV-02-11
-
-
Goubault-Larrecq, J.1
Verma, K.N.2
-
27
-
-
0016973778
-
Resolution strategies as decision procedures
-
W.H. Joyner Jr. Resolution strategies as decision procedures J. ACM 23 3 1976 398 417
-
(1976)
J. ACM
, vol.23
, Issue.3
, pp. 398-417
-
-
Joyner Jr., W.H.1
-
28
-
-
51149098006
-
An E-unification algorithm for analyzing protocols that use modular exponentiation
-
R. Nieuwenhuis, 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain, Springer-Verlag
-
D. Kapur, P. Narendran, and L. Wang An E-unification algorithm for analyzing protocols that use modular exponentiation R. Nieuwenhuis 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain LNCS 2706 2003 Springer-Verlag 165 179
-
(2003)
LNCS
, vol.2706
, pp. 165-179
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
29
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe An attack on the Needham-Schroeder public-key authentication protocol Inform. Process. Lett. 56 3 1996 131 133
-
(1996)
Inform. Process. Lett.
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
30
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows The NRL protocol analyzer: An overview J. Logic Program. 26 2 1996 113 131
-
(1996)
J. Logic Program.
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
31
-
-
31744449198
-
CAPSL and MuCAPSL
-
J. Goubault-Larrecq, Special Issue on Models and Methods for Cryptographic Protocol Verification, Instytut Ła̧ csności (Institute of Telecommunications) Warsaw, Poland
-
J. Millen, and G. Denker CAPSL and MuCAPSL J. Goubault-Larrecq Journal of Telecommunications and Information Technology Special Issue on Models and Methods for Cryptographic Protocol Verification 4 2002 Instytut Ła̧ csności (Institute of Telecommunications) Warsaw, Poland 499 514
-
(2002)
Journal of Telecommunications and Information Technology
, vol.4
, pp. 499-514
-
-
Millen, J.1
Denker, G.2
-
32
-
-
84957716708
-
Abstracting cryptographic protocols with tree automata
-
6th International Static Analysis Symposium (SAS'99), Springer-Verlag
-
D. Monniaux Abstracting cryptographic protocols with tree automata 6th International Static Analysis Symposium (SAS'99) LNCS 1694 1999 Springer-Verlag 149 163
-
(1999)
LNCS
, vol.1694
, pp. 149-163
-
-
Monniaux, D.1
-
33
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham, and M.D. Schroeder Using encryption for authentication in large networks of computers Commun. ACM 21 12 1978 993 999
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
35
-
-
0002596558
-
Building in equational theories
-
G. Plotkin Building in equational theories Mach. Intell. 7 1972 73 90
-
(1972)
Mach. Intell.
, vol.7
, pp. 73-90
-
-
Plotkin, G.1
-
36
-
-
84867820806
-
Vampire 1.1 (system description)
-
R. Goré, A. Leitsch, T. Nipkow (Eds.) Siena, Italy, LNAI, 2083, Springer-Verlag
-
A. Riazanov, A. Voronkov, Vampire 1.1 (system description), in: R. Goré, A. Leitsch, T. Nipkow (Eds.), 1st Intl. Joint Conf. Automated Reasoning (IJCAR), Siena, Italy, LNAI, 2083, Springer-Verlag, 2001, pp. 376-380.
-
(2001)
1st Intl. Joint Conf. Automated Reasoning (IJCAR)
, pp. 376-380
-
-
Riazanov, A.1
Voronkov, A.2
-
39
-
-
0028523063
-
Haskell overloading is DEXPTIME-complete
-
H. Seidl Haskell overloading is DEXPTIME-complete Inform. Process. Lett. 52 2 1994 57 60
-
(1994)
Inform. Process. Lett.
, vol.52
, Issue.2
, pp. 57-60
-
-
Seidl, H.1
-
40
-
-
19144364839
-
Models for an adversary-centric protocol logic
-
J. Goubault-Larrecq, 1st Workshop on Logical Aspects of Cryptographic Protocol Verification (LACPV)
-
P. Selinger Models for an adversary-centric protocol logic J. Goubault-Larrecq 1st Workshop on Logical Aspects of Cryptographic Protocol Verification (LACPV) Electronic Notes in Theoretical Computer Science 55 1 2001 73 87
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.55
, Issue.1
, pp. 73-87
-
-
Selinger, P.1
-
42
-
-
84976741234
-
A unification algorithm for associative-commutative functions
-
M.E. Stickel A unification algorithm for associative-commutative functions J. ACM 28 1981 423 434
-
(1981)
J. ACM
, vol.28
, pp. 423-434
-
-
Stickel, M.E.1
-
44
-
-
9444253566
-
On closure under complementation of equational tree automata for theories extending AC
-
10th Intl. Conf. Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), Almaty, Kazakhstan, Springer-Verlag
-
K.N. Verma On closure under complementation of equational tree automata for theories extending AC 10th Intl. Conf. Logic for Programming, Artificial Intelligence, and Reasoning (LPAR), Almaty, Kazakhstan LNCS 2850 2003 Springer-Verlag 183 197
-
(2003)
LNCS
, vol.2850
, pp. 183-197
-
-
Verma, K.N.1
-
45
-
-
84947774804
-
Two-way equational tree automata for AC-like theories: Decidability and closure properties
-
R. Nieuwenhuis, 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain, Springer-Verlag
-
K.N. Verma Two-way equational tree automata for AC-like theories: Decidability and closure properties R. Nieuwenhuis 14th Intl. Conf. Rewriting Techniques and Applications (RTA), Valencia, Spain LNCS 2706 2003 Springer-Verlag 180 196
-
(2003)
LNCS
, vol.2706
, pp. 180-196
-
-
Verma, K.N.1
-
46
-
-
0002848701
-
Algorithms, datastructures, and other issues in efficient automated deduction
-
R. Goré A. Leitsch T. Nipkow, 1st Intl. Joint Conf. Automated Reasoning (IJCAR), Siena, Italy, Springer-Verlag
-
A. Voronkov Algorithms, datastructures, and other issues in efficient automated deduction R. Goré A. Leitsch T. Nipkow 1st Intl. Joint Conf. Automated Reasoning (IJCAR), Siena, Italy LNAI 2083 2001 Springer-Verlag 13 28
-
(2001)
LNAI
, vol.2083
, pp. 13-28
-
-
Voronkov, A.1
-
47
-
-
84957639842
-
Towards an automatic analysis of security protocols
-
H. Ganzin, 16th Int. Conf. on Automated Deduction (CADE), Springer-Verlag
-
C. Weidenbach Towards an automatic analysis of security protocols H. Ganzin 16th Int. Conf. on Automated Deduction (CADE) LNAI 1632 1999 Springer-Verlag 378 382
-
(1999)
LNAI
, vol.1632
, pp. 378-382
-
-
Weidenbach, C.1
-
48
-
-
15544363314
-
Combining superposition, sorts and splitting
-
J.A. Robinson A. Voronkov North-Holland
-
C. Weidenbach Combining superposition, sorts and splitting J.A. Robinson A. Voronkov Handbook of Automated Reasoning, vol. II 2001 North-Holland 1965 2013 Chapter 27
-
(2001)
Handbook of Automated Reasoning, Vol. II
, pp. 1965-2013
-
-
Weidenbach, C.1
|