-
2
-
-
0036040302
-
Analyzing security protocols with secrecy types and logic programs
-
Jan.
-
M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. In Proceedings of POPL'02, pages 33-44, Jan. 2002.
-
(2002)
Proceedings of POPL'02
, pp. 33-44
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
0030643343
-
A calculus for cryptographic protocols: The spi calculus
-
ACM Press
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. In Fourth ACM Conference on CCS, pages 36-47. ACM Press, 1997.
-
(1997)
Fourth ACM Conference on CCS
, pp. 36-47
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
84937200470
-
Local and symbolic bisimulation using tabled constraint logic programming
-
S. Basu, M. Mukund, C. R. Ramakrishnan, I. V. Ramakrishnan, and R. M. Verma. Local and symbolic bisimulation using tabled constraint logic programming. In International Conference on Logic Programming, pages 166-180, 2001.
-
(2001)
International Conference on Logic Programming
, pp. 166-180
-
-
Basu, S.1
Mukund, M.2
Ramakrishnan, C.R.3
Ramakrishnan, I.V.4
Verma, R.M.5
-
7
-
-
1242331182
-
From secrecy to authenticity in security protocols
-
September
-
B. Blanchet. From secrecy to authenticity in security protocols. In 9th International Static Analysis Symposium, pages 242-259, September 2002.
-
(2002)
9th International Static Analysis Symposium
, pp. 242-259
-
-
Blanchet, B.1
-
8
-
-
3042768691
-
Maude: Specification and programming in rewriting logic
-
M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Mart́i-Oliet, J. Meseguer, and J. Quesada. Maude: Specification and programming in rewriting logic. Theoretical Computer Science, 2001.
-
(2001)
Theoretical Computer Science
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Mart́i-Oliet, N.5
Meseguer, J.6
Quesada, J.7
-
13
-
-
84944872561
-
Principles of mobile maude
-
Springer-Verlag
-
F. Duran, S. Eker, P. Lincoln, and J. Meseguer. Principles of mobile maude. In Proc. ASA/MA, volume 1882, pages 73-85. Springer-Verlag, 2000.
-
(2000)
Proc. ASA/MA
, vol.1882
, pp. 73-85
-
-
Duran, F.1
Eker, S.2
Lincoln, P.3
Meseguer, J.4
-
17
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters, pages 131-133, 1995.
-
(1995)
Information Processing Letters
, pp. 131-133
-
-
Lowe, G.1
-
18
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Software Concepts and Tools, 17:93-102, 1996.
-
(1996)
Software Concepts and Tools
, vol.17
, pp. 93-102
-
-
Lowe, G.1
-
19
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL protocol analyzer: an overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
20
-
-
0003954103
-
-
International Series in Computer Science. Prentice Hall
-
R. Milner. Communication and Concurrency. International Series in Computer Science. Prentice Hall, 1989.
-
(1989)
Communication and Concurrency
-
-
Milner, R.1
-
22
-
-
44049113210
-
A calculus of mobile processes, Parts I and II
-
R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, Parts I and II. Information and Computation, 100(1):1-77, 1992.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
24
-
-
0000335030
-
An algebraic verification of a mobile network
-
F. Orava and J. Parrow. An algebraic verification of a mobile network. Formal Aspects of Computing, 4:497-543, 1992.
-
(1992)
Formal Aspects of Computing
, vol.4
, pp. 497-543
-
-
Orava, F.1
Parrow, J.2
-
25
-
-
0010728871
-
An introduction to the π-calculus
-
Bergstra, Ponse, and Smolka, editors, Elsevier
-
J. Parrow. An introduction to the π-calculus. In Bergstra, Ponse, and Smolka, editors, Handbook of Process Algebra. Elsevier, 2001.
-
(2001)
Handbook of Process Algebra
-
-
Parrow, J.1
-
26
-
-
0000555116
-
Efficient model checking using tabled resolution
-
Haifa, Israel, July
-
Y. S. Ramakrishna, C. R. Ramakrishnan, I. V. Ramakrishnan, S. A. Smolka, T. W. Swift, and D. S. Warren. Efficient model checking using tabled resolution. In Proceedings of CAV '97, Haifa, Israel, July 1997.
-
(1997)
Proceedings of CAV '97
-
-
Ramakrishna, Y.S.1
Ramakrishnan, C.R.2
Ramakrishnan, I.V.3
Smolka, S.A.4
Swift, T.W.5
Warren, D.S.6
-
27
-
-
1842690191
-
Verification of parameterized systems using logic-program transformations
-
A. Roychoudhury, K. Narayan Kumar, C.R. Ramakrishnan, I.V. Ramakrishnan, and S.A. Smolka. Verification of parameterized systems using logic-program transformations. In Proceedings of TACAS 2000, 2000.
-
(2000)
Proceedings of TACAS 2000
-
-
Roychoudhury, A.1
Narayan Kumar, K.2
Ramakrishnan, C.R.3
Ramakrishnan, I.V.4
Smolka, S.A.5
-
30
-
-
19044388279
-
-
Technical report, Department of Computer Systems, Uppsala University, Sweden
-
B. Victor. The mobility workbench user's guide. Technical report, Department of Computer Systems, Uppsala University, Sweden, 1995.
-
(1995)
The Mobility Workbench User's Guide
-
-
Victor, B.1
-
31
-
-
0001223167
-
The mobility workbench - A tool for the π-calculus
-
D. Dill, editor, Springer-Verlag
-
B. Victor and F. Moller. The mobility workbench - a tool for the π-calculus. In D. Dill, editor, Proceedings of CAV'94. Springer-Verlag, 1994.
-
(1994)
Proceedings of CAV'94
-
-
Victor, B.1
Moller, F.2
|