-
1
-
-
84874678490
-
On name generation and set-based analysis in the Dolev-Yao model
-
13th International Conference on Concurrency Theory CONCUR'02. Springer-Verlag
-
R. M. Amadio and W. Charatonik. On name generation and set-based analysis in the Dolev-Yao model. In 13th International Conference on Concurrency Theory CONCUR'02, volume 2421 of Lecture Notes in Computer Science, pages 499-514. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2421
, pp. 499-514
-
-
Amadio, R.M.1
Charatonik, W.2
-
3
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Cape Breton, Nova Scotia, Canada, June. IEEE Computer Society
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In 14th IEEE Computer Security Foundations Workshop (CSFW-14), pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001. IEEE Computer Society.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14)
, pp. 82-96
-
-
Blanchet, B.1
-
4
-
-
84887962732
-
Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software, invited chapter
-
T. Mogensen, D. A. Schmidt, and I. H. Sudborough, editors, The Essence of Computation: Complexity, Analysis, Transformation. Essays Dedicated to Neil D. Jones. Springer Verlag, Dec.
-
B. Blanchet, P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné, D. Monniaux, and X. Rival. Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded Software, invited chapter. In T. Mogensen, D. A. Schmidt, and I. H. Sudborough, editors, The Essence of Computation: Complexity, Analysis, Transformation. Essays Dedicated to Neil D. Jones, volume 2566 of Lecture Notes on Computer Science, pages 85-108. Springer Verlag, Dec. 2002.
-
(2002)
Lecture Notes on Computer Science
, vol.2566
, pp. 85-108
-
-
Blanchet, B.1
Cousot, P.2
Cousot, R.3
Feret, J.4
Mauborgne, L.5
Miné, A.6
Monniaux, D.7
Rival, X.8
-
5
-
-
0038039865
-
A static analyzer for large safety-critical software
-
San Diego, California, June. ACM
-
B. Blanchet, P. Cousot, R. Cousot, J. Feret, L. Mauborgne, A. Miné, D. Monniaux, and X. Rival. A Static Analyzer for Large Safety-Critical Software. In ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI'03), pages 196-207, San Diego, California, June 2003. ACM.
-
(2003)
ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation (PLDI'03)
, pp. 196-207
-
-
Blanchet, B.1
Cousot, P.2
Cousot, R.3
Feret, J.4
Mauborgne, L.5
Miné, A.6
Monniaux, D.7
Rival, X.8
-
7
-
-
35248860689
-
Security properties: Two agents are sufficient
-
Warsaw, Poland, Apr. Springer-Verlag LNCS 2618
-
H. Comon-Lundh and V. Cortier. Security properties: Two agents are sufficient. In Proc. 12th European Symposium on Programming (ESOP'2003), pages 99-113, Warsaw, Poland, Apr. 2003. Springer-Verlag LNCS 2618.
-
(2003)
Proc. 12th European Symposium on Programming (ESOP'2003)
, pp. 99-113
-
-
Comon-Lundh, H.1
Cortier, V.2
-
9
-
-
0042500424
-
Undecidability of bounded security protocols
-
N. Heintze and E. Clarke, editors July
-
N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Undecidability of bounded security protocols. In N. Heintze and E. Clarke, editors, Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP, Trento, Italy, July 1999.
-
(1999)
Proceedings of the Workshop on Formal Methods and Security Protocols - FMSP, Trento, Italy
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
11
-
-
84860984286
-
Exploitation avancée de buffer overflows
-
LASEC, Ecole Polytechnique Fédérale de Lausanne, June
-
O. Gay. Exploitation avancée de buffer overflows. Technical report, LASEC, Ecole Polytechnique Fédérale de Lausanne, June 2002. http://diwww.epfl.ch/~ogay/advbof/advbof.pdf.
-
(2002)
Technical Report
-
-
Gay, O.1
-
12
-
-
84860986175
-
-
Instytut Ła̧csności (Institute of Telecommunications), Warsaw, Poland, Dec.
-
J. Goubault-Larrecq, editor. Special Issue on Models and Methods for Cryptographic Protocol Verification, volume 4. Instytut Ła̧csności (Institute of Telecommunications), Warsaw, Poland, Dec. 2002.
-
(2002)
Special Issue on Models and Methods for Cryptographic Protocol Verification
, vol.4
-
-
Goubault-Larrecq, J.1
-
13
-
-
20144382303
-
Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve ?
-
Sainte-Marie-de-Ré France, Janvier. INRIA
-
J. Goubault-Larrecq. Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve ? In Actes 15èmes journées francophones sur les langages applicatifs (JFLA'04), Sainte-Marie-de-Ré France, Janvier 2004. INRIA.
-
(2004)
Actes 15èmes Journées Francophones sur les Langages Applicatifs (JFLA'04)
-
-
Goubault-Larrecq, J.1
-
16
-
-
33645606517
-
Automatic verification of confidentiality properties of cryptographic programs
-
N. E. Kadhi. Automatic verification of confidentiality properties of cryptographic programs. Networking and Information Systems, 3(6), 2001.
-
(2001)
Networking and Information Systems
, vol.3
, Issue.6
-
-
Kadhi, N.E.1
-
17
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Information Processing Letters, 56(3): 131-133, 1995.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
19
-
-
0018048246
-
Using encryption for authentification in large networks of computers
-
December
-
R. Needham and M. Schroeder. Using encryption for authentification in large networks of computers. Communications of the ACM, 21(12), December 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
-
-
Needham, R.1
Schroeder, M.2
-
20
-
-
84958766164
-
Normalizable horn clauses, strongly recognizable relations, and spi
-
Springer-Verlag
-
F. Nielson, H. R. Nielson, and H. Seidl. Normalizable horn clauses, strongly recognizable relations, and spi. In Proceedings of the 9th International Symposium on Static Analysis, volume 2477, pages 20-35. Springer-Verlag, 2002.
-
(2002)
Proceedings of the 9th International Symposium on Static Analysis
, vol.2477
, pp. 20-35
-
-
Nielson, F.1
Nielson, H.R.2
Seidl, H.3
-
22
-
-
0039488517
-
Parametric shape analysis via 3-valued logic
-
may
-
S. Sagiv, T. W. Reps, and R. Wilhelm. Parametric shape analysis via 3-valued logic. ACM Trans. Prog. Lang. Sys., 24(3):217-298, may 2002.
-
(2002)
ACM Trans. Prog. Lang. Sys.
, vol.24
, Issue.3
, pp. 217-298
-
-
Sagiv, S.1
Reps, T.W.2
Wilhelm, R.3
-
23
-
-
19144364839
-
Models for an adversary-centric protocol logic
-
July Proceedings of the 1st Workshop on Logical Aspects of Cryptographic Protocol Verification (LACPV'01), J. Goubault-Larrecq, ed.
-
P. Selinger. Models for an adversary-centric protocol logic. Electronic Notes in Theoretical Computer Science, 55(1):73-87, July 2001. Proceedings of the 1st Workshop on Logical Aspects of Cryptographic Protocol Verification (LACPV'01), J. Goubault-Larrecq, ed.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.55
, Issue.1
, pp. 73-87
-
-
Selinger, P.1
-
25
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
San Diego, CA, February
-
D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Network and Distributed System Security Symposium, pages 3-17, San Diego, CA, February 2000.
-
(2000)
Network and Distributed System Security Symposium
, pp. 3-17
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
26
-
-
0001592091
-
Towards an automatic analysis of security protocols
-
H. Ganzinger, editor. Springer
-
C. Weidenbach. Towards an automatic analysis of security protocols. In H. Ganzinger, editor, 16th International Conference on Automated Deduction CADE-16, volume 1632, pages 378-382. Springer, 1999.
-
(1999)
16th International Conference on Automated Deduction CADE-16
, vol.1632
, pp. 378-382
-
-
Weidenbach, C.1
-
27
-
-
70350690461
-
SPASS version 2.0
-
Springer-Verlag LNCS 2392
-
C. Weidenbach, U. Brahm, T. Hillenbrand, E. Keen, C. Theobald, and D. Topic. SPASS version 2.0. In Proc. 18th Conference on Automated Deduction (CADE 2002), pages 275-279. Springer-Verlag LNCS 2392, 2002.
-
(2002)
Proc. 18th Conference on Automated Deduction (CADE 2002)
, pp. 275-279
-
-
Weidenbach, C.1
Brahm, U.2
Hillenbrand, T.3
Keen, E.4
Theobald, C.5
Topic, D.6
|