-
2
-
-
84947983991
-
The benefits of relaxing punctuality
-
ACM Press
-
R. Alur, T. Feder, T.A. Henzinger, The benefits of relaxing punctuality, in: Proceedings of the 10th ACM Symposium on Principles of Distributed Computing, ACM Press, 1991, pp. 139-152
-
(1991)
Proceedings of the 10th ACM Symposium on Principles of Distributed Computing
, pp. 139-152
-
-
Alur, R.1
Feder, T.2
Henzinger, T.A.3
-
3
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
International Conference on Concurrency Theory
-
R.M. Amadio, D.Lugiez, On the reachability problem in cryptographic protocols, in: International Conference on Concurrency Theory, LNCS, vol. 1877, 2000, pp. 380-394
-
(2000)
LNCS
, vol.1877
, pp. 380-394
-
-
Amadio, R.M.1
Lugiez, D.2
-
4
-
-
84863900858
-
Mechanizing BAN Kerberos by the inductive method
-
A.J. Hu, M.Y. Vardi (Eds.), Proceedings of the 10th International Conference on Computer-Aided Verification (CAV'98), Vancouver, BC, Canada, June 1998 Springer-Verlag
-
G.Bella, L.C. Paulson, Mechanizing BAN Kerberos by the inductive method, in: A.J. Hu, M.Y. Vardi (Eds.), Proceedings of the 10th International Conference on Computer-Aided Verification (CAV'98), Vancouver, BC, Canada, June 1998, LNCS, Springer-Verlag, vol. 1427, pp. 416-427
-
LNCS
, vol.1427
, pp. 416-427
-
-
Bella, G.1
Paulson, L.C.2
-
6
-
-
21844488819
-
Temporal logic + timed automata: Expressiveness and decidability
-
I. Lee, S.A. Smolka (Eds.), CONCUR'95: Concurrency Theory Springer-Verlag
-
A. Bouajjani, Y. Lakhnech, Temporal logic + timed automata: expressiveness and decidability, in: I. Lee, S.A. Smolka (Eds.), CONCUR'95: Concurrency Theory, LNCS, Springer-Verlag, vol. 962, 1995, pp. 531-546
-
(1995)
LNCS
, vol.962
, pp. 531-546
-
-
Bouajjani, A.1
Lakhnech, Y.2
-
9
-
-
0003568551
-
-
Department of Computer Science, University of York, November
-
J.A. Clark, J.L. Jacob, A survey of authentication protocol literature, Version 1.0, Department of Computer Science, University of York, November 1997
-
(1997)
A Survey of Authentication Protocol Literature, Version 1.0
-
-
Clark, J.A.1
Jacob, J.L.2
-
13
-
-
84947780217
-
New decidability results for fragments of first-order logic and application to cryptographic protocols
-
14th Int. Conf. Rewriting Techniques and Applications (RTA'2003)
-
H. Comon-Lundh, V. Cortier, New decidability results for fragments of first-order logic and application to cryptographic protocols, in: 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), LNCS, vol. 2706, 2003
-
(2003)
LNCS
, vol.2706
-
-
Comon-Lundh, H.1
Cortier, V.2
-
16
-
-
84944070422
-
Analyzing time dependent security properties in CSP using PVS
-
Neil Evans, and Steve Schneider Analyzing time dependent security properties in CSP using PVS ESORICS 2000 222 237
-
(2000)
ESORICS
, pp. 222-237
-
-
Evans, N.1
Schneider, S.2
-
17
-
-
0034829105
-
Computing symbolic models for verifying cryptographic protocols
-
Washington-Brussels-Tokyo, June IEEE
-
M. Fiore, M. Abadi, Computing symbolic models for verifying cryptographic protocols, in: 14th IEEE Computer Security Foundations Workshop (CSFW '01), Washington-Brussels-Tokyo, June 2001, IEEE, pp. 160-173
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW '01)
, pp. 160-173
-
-
Fiore, M.1
Abadi, M.2
-
18
-
-
0003370741
-
A security risk of depending on synchronized clocks
-
Li Gong A security risk of depending on synchronized clocks Operating Systems Review 26 1 1992 49 53
-
(1992)
Operating Systems Review
, vol.26
, Issue.1
, pp. 49-53
-
-
Li, G.1
-
19
-
-
0026882867
-
Symbolic model-checking for real-time systems
-
IEEE Computer Society Press
-
T.A. Henzinger, X. Nicollin, J. Sifakis, S. Yovine, Symbolic model-checking for real-time systems, in: Seventh Annual IEEE Symposium on Logic in Computer Science, IEEE Computer Society Press, 1992, pp. 394-406
-
(1992)
Seventh Annual IEEE Symposium on Logic in Computer Science
, pp. 394-406
-
-
Henzinger, T.A.1
Nicollin, X.2
Sifakis, J.3
Yovine, S.4
-
20
-
-
0002692684
-
Solving equations in abstract algebras: A rule-based survey of unification
-
Jean-Louis Lassez Gordon Plotkin MIT Press
-
J.P. Jouannaud, and C. Kirchner Solving equations in abstract algebras: a rule-based survey of unification Jean-Louis Lassez Gordon Plotkin Computational Logic Essays in Honor of Alan Robinson 1991. MIT Press
-
(1991)
Computational Logic Essays in Honor of Alan Robinson
-
-
Jouannaud, J.P.1
Kirchner, C.2
-
21
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems
-
G. Lowe, Breaking and fixing the Needham-Schroeder Public-Key protocol using FDR, in: Tools and Algorithms for the Construction and Analysis of Systems, LNCS, vol. 1055, 1996, pp. 147-166
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
22
-
-
0030708255
-
A hierarchy of authentication specifications
-
Washington-Brussels-Tokyo, June IEEE
-
G. Lowe. A hierarchy of authentication specifications, in: 10th IEEE Computer Security Foundations Workshop (CSFW '97), Washington-Brussels-Tokyo, June 1997, IEEE, pp. 31-44
-
(1997)
10th IEEE Computer Security Foundations Workshop (CSFW '97)
, pp. 31-44
-
-
Lowe, G.1
-
25
-
-
0029713842
-
Intensional specification of security protocols
-
Washington-Brussels-Tokyo, June IEEE
-
A.W. Roscoe. Intensional specification of security protocols, in: 9th IEEE Computer Security Foundations Workshop (CSFW '96), Washington-Brussels- Tokyo, June 1996, IEEE, pp. 28-38
-
(1996)
9th IEEE Computer Security Foundations Workshop (CSFW '96)
, pp. 28-38
-
-
Roscoe, A.W.1
-
30
-
-
0023327786
-
Decidability of the purely existential fragment of the theory of term algebras
-
K.N. Venkataraman Decidability of the purely existential fragment of the theory of term algebras JACM 1987.
-
(1987)
JACM
-
-
Venkataraman, K.N.1
-
31
-
-
0026630927
-
Authentication for distributed systems
-
T.Y.C. Woo, and S.S. Lam Authentication for distributed systems Computer 25 1 1992 39 52
-
(1992)
Computer
, vol.25
, Issue.1
, pp. 39-52
-
-
Woo, T.Y.C.1
Lam, S.S.2
|