-
1
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
R.M. Amadio, D. Lugiez, and V. Vanackere. On the symbolic reduction of processes with cryptographic functions. TCS, 290(1):695-740, 2002.
-
(2002)
TCS
, vol.290
, Issue.1
, pp. 695-740
-
-
Amadio, R.M.1
Lugiez, D.2
Vanackere, V.3
-
2
-
-
84937567009
-
The AVISS security protocol analysis tool
-
CAV 2002. Springer
-
A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Mödersheim, M. Rusinowitch, M. Turuani, L. Viganò, and L. Vigneron. The AVISS Security Protocol Analysis Tool. In CAV 2002, volume 2404 of LNCS, pages 349-353. Springer, 2002.
-
(2002)
LNCS
, vol.2404
, pp. 349-353
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Mödersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Viganò, L.9
Vigneron, L.10
-
4
-
-
0025246897
-
A fair protocol for signing contracts
-
M. Ben-Or, O. Goldreich, S. Micali, and R.L. Rivest. A fair protocol for signing contracts. IEEE Transactions on Information Theory, 36(1):40-46, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.L.4
-
5
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
ICALP 2001. Springer-Verlag
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In ICALP 2001, volume 2076 of Lecture Notes in Computer Science, pages 667-681. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
6
-
-
0035751922
-
Inductive methods and contract-signing protocols
-
ACM Press
-
R. Chadha, M.I. Kanovich, and A.Scedrov. Inductive methods and contract-signing protocols. In CCS 2001, pages 176-185. ACM Press, 2001.
-
(2001)
CCS 2001
, pp. 176-185
-
-
Chadha, R.1
Kanovich, M.I.2
Scedrov, A.3
-
7
-
-
4944247375
-
Formal analysis of multi-party contract signing
-
IEEE Computer Society Press
-
R. Chadha, S. Kremer, and A. Scedrov. Formal analysis of multi-party contract signing. In CSFW-17, pages 266-279. IEEE Computer Society Press, 2004.
-
(2004)
CSFW-17
, pp. 266-279
-
-
Chadha, R.1
Kremer, S.2
Scedrov, A.3
-
10
-
-
84957060126
-
Abuse-free optimistic contract signing
-
CRYPTO'99. Springer-Verlag
-
J.A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In CRYPTO'99, volume 1666 of LNCS, pages 449-466. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.3
-
11
-
-
77957159140
-
Deciding Properties of Contract-Signing Protocols
-
CAU Kiel
-
D. Kähler, R. Küster, T. Wilke. Deciding Properties of Contract-Signing Protocols. Technical Report IFI 0409, CAU Kiel, 2004. Available from http://www.informatik.uni-kiel.de/reports/2004/0409.html
-
(2004)
Technical Report
, vol.IFI 0409
-
-
Kähler, D.1
Küster, R.2
Wilke, T.3
-
13
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: Emerging issues and trends
-
January
-
C. Meadows. Formal Methods for Cryptographic Protocol Analysis: Emerging Issues and Trends. IEEE Journal on Selected Areas in Communication, 21(1):44-54, January 2003.
-
(2003)
IEEE Journal on Selected Areas in Communication
, vol.21
, Issue.1
, pp. 44-54
-
-
Meadows, C.1
-
14
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
ACM Press
-
J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166-175. ACM Press, 2001.
-
(2001)
CCS 2001
, pp. 166-175
-
-
Millen, J.K.1
Shmatikov, V.2
-
15
-
-
0037453396
-
Protocol insecurity with a finite number of sessions, composed keys is NP-complete
-
M. Rusinowitch and M. Turuani. Protocol insecurity with a finite number of sessions, composed keys is NP-complete. Theoretical Computer Science, 299(1-3):451-475, 2003.
-
(2003)
Theoretical Computer Science
, vol.299
, Issue.1-3
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
-
16
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
V. Shmatikov and J.C. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 283(2) :419-450, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
|