-
1
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Proc. 11th International Conference on Concurrency Theory (CONCUR '00), Springer-Verlag
-
R. Amadio and D. Lugiez, On the reachability problem in cryptographic protocols, in: Proc. 11th International Conference on Concurrency Theory (CONCUR '00), Volume 1877 of LNC5, Springer-Verlag, 2000, pp. 380-394.
-
(2000)
LNC5
, vol.1877
, pp. 380-394
-
-
Amadio, R.1
Lugiez, D.2
-
2
-
-
85083027758
-
Reconciling two views of cryptography
-
M. Abadi and P. Rogaway, Reconciling two views of cryptography, J. Cryptology 15(2) (2002), 103-127.
-
(2002)
J. Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
3
-
-
33645585862
-
On the symbolic analysis of low-level cryptographic primitives: Modular exponentiation and the Diffie-Hellman protocol
-
M. Boreale and M. Buscemi, On the symbolic analysis of low-level cryptographic primitives: modular exponentiation and the Diffie-Hellman protocol, in: Proc. Workshop on the Foundations of Computer Security (FCS), 2003.
-
(2003)
Proc. Workshop on the Foundations of Computer Security (FCS)
-
-
Boreale, M.1
Buscemi, M.2
-
4
-
-
33645604225
-
Introducing commutative and associative operators in cryptographic protocol analysis
-
Proc. 23rd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE '03), Springer-Verlag
-
I.C. Bertolotti, L. Durante, R. Sisto and A. Valenzano, Introducing commutative and associative operators in cryptographic protocol analysis, in: Proc. 23rd International Conference on Formal Techniques for Networked and Distributed Systems (FORTE '03), Volume 2767 of LNCS, Springer-Verlag, 2003, pp. 224-239.
-
(2003)
LNCS
, vol.2767
, pp. 224-239
-
-
Bertolotti, I.C.1
Durante, L.2
Sisto, R.3
Valenzano, A.4
-
5
-
-
18744415053
-
Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols
-
D. Basin, S. Mödersheim and L. Vigano, Constraint differentiation: a new reduction technique for constraint-based analysis of security protocols, in: Proc, 10th ACM Conference on Computer and Communications Security (CCS'03), 2003, pp. 335-344.
-
(2003)
Proc, 10th ACM Conference on Computer and Communications Security (CCS'03)
, pp. 335-344
-
-
Basin, D.1
Mödersheim, S.2
Vigano, L.3
-
6
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
Proc. 28th International Colloquium on Automata, Languages and Programing (ICALP '01), Springer-Verlag
-
M. Boreale, Symbolic trace analysis of cryptographic protocols, in: Proc. 28th International Colloquium on Automata, Languages and Programing (ICALP '01), Volume 2076 of LNCS, Springer-Verlag, 2001, pp. 667-681.
-
(2001)
LNCS
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
7
-
-
0346205107
-
Unification theory
-
A. Robinson and A. Voronkov, eds, Chapter 8, Elsevier Science
-
F. Baader and W. Snyder, Unification theory, in: Handbook of Automated Reasoning, A. Robinson and A. Voronkov, eds, Volume 1, Chapter 8, Elsevier Science, 2001, pp. 445-532.
-
(2001)
Handbook of Automated Reasoning
, vol.1
, pp. 445-532
-
-
Baader, F.1
Snyder, W.2
-
8
-
-
35248897454
-
Tree automata with one memory, set constraints, and ping-pong protocols
-
Proc. 28th International Colloquium on Automata, Languages and Programming (ICALP '01), Springer-Verlag
-
H. Comon, V. Cortier and J.C. Mitchell, Tree automata with one memory, set constraints, and ping-pong protocols, in: Proc. 28th International Colloquium on Automata, Languages and Programming (ICALP '01), Volume 2076 of LNCS, Springer-Verlag, 2001, pp. 682-693.
-
(2001)
LNCS
, vol.2076
, pp. 682-693
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.C.3
-
9
-
-
0001113391
-
An efficient algorithm for solving systems of Diophantine equations
-
E. Contejean and H. Devie, An efficient algorithm for solving systems of Diophantine equations, Information and Computation 113(1) (1994), 143-172.
-
(1994)
Information and Computation
, vol.113
, Issue.1
, pp. 143-172
-
-
Contejean, E.1
Devie, H.2
-
10
-
-
84958742278
-
An improved constraint-based system for the verification of security protocols
-
Proc. 9th International Static Analysis Symposium (SAS '02), Springer-Verlag
-
R. Corin and S. Etalle, An improved constraint-based system for the verification of security protocols, in: Proc. 9th International Static Analysis Symposium (SAS '02), Volume 2477 of LNCS, Springer-Verlag, 2002, pp. 326-341.
-
(2002)
LNCS
, vol.2477
, pp. 326-341
-
-
Corin, R.1
Etalle, S.2
-
11
-
-
0039334690
-
Verifying security protocols with Brutus
-
E.M. Clarke, S. Jha and W. Marrero, Verifying security protocols with Brutus, ACM Transactions in Software Engineering Methodology (TOSEM) 9(4) (2000), 443-487.
-
(2000)
ACM Transactions in Software Engineering Methodology (TOSEM)
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.3
-
12
-
-
33645587296
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
CAU Kiel
-
Y. Chevalier, R. Küters, M. Rusinowitch and M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, Technical Report IFI-Report 0305, CAU Kiel, 2003.
-
(2003)
Technical Report IFI-Report
, vol.305
-
-
Chevalier, Y.1
Küters, R.2
Rusinowitch, M.3
Turuani, M.4
-
13
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
Y. Chevalier, R. Küsters, M. Rusinowitch and M. Turuani, An NP decision procedure for protocol insecurity with XOR, in: Proc. 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), 2003, pp. 261-270.
-
(2003)
Proc. 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03)
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
18
-
-
33645604729
-
A unification algorithm for analysis of protocols with blinded signatures
-
SUNY Albany
-
D. Kapur, P. Narendran and L. Wang, A unification algorithm for analysis of protocols with blinded signatures, Technical Report 02-5, SUNY Albany, 2002.
-
(2002)
Technical Report
, vol.2
, Issue.5
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
19
-
-
51149098006
-
An e-unification algorithm for analyzing protocols that use modular exponentiation
-
Proc. 14th International Conference on Rewriting Techniques and Applications (RTA '03), Springer-Verlag
-
D. Kapur, P. Narendran and L. Wang, An e-unification algorithm for analyzing protocols that use modular exponentiation, in: Proc. 14th International Conference on Rewriting Techniques and Applications (RTA '03), Volume 2706 of LNCS, Springer-Verlag, 2003, pp. 165-179.
-
(2003)
LNCS
, vol.2706
, pp. 165-179
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
20
-
-
0017996760
-
Time, clocks and the ordering of events in a distributed system
-
L. Lamport, Time, clocks and the ordering of events in a distributed system, Comms. ACM 21(7) (1978), 558-565.
-
(1978)
Comms. ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
21
-
-
85006279726
-
Adventures in associative-communtative unification
-
P. Lincoln and J. Christian, Adventures in associative-communtative unification, J. Symb. Comput. 8(1-2) (1989), 217-240.
-
(1989)
J. Symb. Comput.
, vol.8
, Issue.1-2
, pp. 217-240
-
-
Lincoln, P.1
Christian, J.2
-
22
-
-
0037611038
-
On the freedom of decryption
-
J. Millen, On the freedom of decryption, Information Processing Letters 86(6) (2003), 329-333.
-
(2003)
Information Processing Letters
, vol.86
, Issue.6
, pp. 329-333
-
-
Millen, J.1
-
26
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson, The inductive approach to verifying cryptographic protocols, J. Computer Security 6(1/2) (1998), 85-128.
-
(1998)
J. Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.1
-
28
-
-
0002219322
-
An attack on a recursive authentication protocol: A cautionary tale
-
P. Ryan and S. Schneider, An attack on a recursive authentication protocol: A cautionary tale, Information Processing Letters 65(1) (1998), 7-10.
-
(1998)
Information Processing Letters
, vol.65
, Issue.1
, pp. 7-10
-
-
Ryan, P.1
Schneider, S.2
-
30
-
-
35048827395
-
Decidable analysis of cryptographic protocols with products and modular exponentiation
-
Proc. 13th European Symposium on Programming (ESOP '04), Springer-Verlag
-
V. Shmatikov, Decidable analysis of cryptographic protocols with products and modular exponentiation, in: Proc. 13th European Symposium on Programming (ESOP '04), Volume 2986 of LNCS, Springer-Verlag, 2004, pp. 355-369.
-
(2004)
LNCS
, vol.2986
, pp. 355-369
-
-
Shmatikov, V.1
-
31
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
D. Song, Athena: a new efficient automatic checker for security protocol analysis, in: Proc. 12th IEEE Computer Security Foundations Workshop, 1999, pp. 192-202.
-
(1999)
Proc. 12th IEEE Computer Security Foundations Workshop
, pp. 192-202
-
-
Song, D.1
-
32
-
-
84937708748
-
Unification in a combination of arbitrary disjoint equational theories
-
M. Schmidt-Schauss, Unification in a combination of arbitrary disjoint equational theories, J. Symbolic Computation 8 (1989), 51-99.
-
(1989)
J. Symbolic Computation
, vol.8
, pp. 51-99
-
-
Schmidt-Schauss, M.1
|