-
1
-
-
85006614284
-
Verifying security protocols as planning in logic programming
-
Oct.
-
L. C. Aiello and F. Massacci. Verifying security protocols as planning in logic programming. ACM Trans. on Computational Logic, 2(4):542-580, Oct. 2001.
-
(2001)
ACM Trans. on Computational Logic
, vol.2
, Issue.4
, pp. 542-580
-
-
Aiello, L.C.1
Massacci, F.2
-
2
-
-
84937567009
-
The AVISS security protocol analysis tool
-
LNCS 2404. Springer-Verlag
-
A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Mödersheim, M. Rusinowitch, M. Turuani, L. Viganò, and L. Vigneron. The AVISS Security Protocol Analysis Tool. In Proc.of CAV'02, LNCS 2404. Springer-Verlag, 2002.
-
(2002)
Proc.of CAV'02
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Mödersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Viganò, L.9
Vigneron, L.10
-
3
-
-
84954313527
-
Automatic SAT-compilation of protocol insecurity problems via reduction to planning
-
A. Armando and L. Compagna. Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. In Proc.of FORTE 2002. 2002.
-
(2002)
Proc.of FORTE 2002
-
-
Armando, A.1
Compagna, L.2
-
4
-
-
35048841165
-
Abstraction-driven SAT-based analysis of security protocols
-
LNCS 2919. Springer-Verlag
-
A. Armando and L. Compagna. Abstraction-driven SAT-based Analysis of Security Protocols. In Proc.of SAT 2003, LNCS 2919. Springer-Verlag, 2003.
-
(2003)
Proc.of SAT 2003
-
-
Armando, A.1
Compagna, L.2
-
5
-
-
22944474197
-
An optimized intruder Model for SAT-based model-checking of security protocols
-
A. Armando and L. Compagna. An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. In Proc. of ARSPA Workshop. 2004.
-
(2004)
Proc. of ARSPA Workshop
-
-
Armando, A.1
Compagna, L.2
-
6
-
-
35248876774
-
SAT-based model-checking of security protocols using planning graph analysis
-
A. Armando, L. Compagna, and P. Ganty. SAT-based Model-Checking of Security Protocols using Planning Graph Analysis. In Proc.of FME'2003. 2003.
-
(2003)
Proc.of FME'2003
-
-
Armando, A.1
Compagna, L.2
Ganty, P.3
-
14
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: a Compiler for the Analysis of Security Protocols. Journal of Computer Security, 6(1):53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 53-84
-
-
Lowe, G.1
-
15
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In Proc. of the CCS'01, pages 166-175, 2001.
-
(2001)
Proc. of the CCS'01
, pp. 166-175
-
-
Millen, J.K.1
Shmatikov, V.2
-
16
-
-
0032678887
-
A new efficient automatic checker for security protocol analysis
-
D. Song. Athena: A new efficient automatic checker for security protocol analysis. In Proc.of 12th Computer Security Foundation Workshop, pages 192-202, 1999.
-
(1999)
Proc.of 12th Computer Security Foundation Workshop
, pp. 192-202
-
-
Athena, D.S.1
|