-
1
-
-
84874678490
-
On Name Generation and Set-Based Analysis in the Dolev-Yao Model
-
CONCUR 2002, Springer-Verlag
-
R.M. Amadio and W. Charatonik. On Name Generation and Set-Based Analysis in the Dolev-Yao Model. In CONCUR 2002, LNCS 2421, pages 499-514. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2421
, pp. 499-514
-
-
Amadio, R.M.1
Charatonik, W.2
-
3
-
-
84937567009
-
The AVISS Security Protocol Analysis Tool
-
CAV 2002, Springer
-
A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Mödersheim, M. Rusinowitch, M. Turuani, L. Viganò, and L. Vigneron. The AVISS Security Protocol Analysis Tool. In CAV 2002, LNCS 2404, pages 349-353. Springer, 2002.
-
(2002)
LNCS
, vol.2404
, pp. 349-353
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Mödersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Viganò, L.9
Vigneron, L.10
-
6
-
-
0041498629
-
Automated unbounded verification of security protocols
-
Springer
-
Y. Chevalier and L. Vigneron. Automated unbounded verification of security protocols. In CAV 2002, Springer, 2002.
-
(2002)
CAV 2002
-
-
Chevalier, Y.1
Vigneron, L.2
-
8
-
-
84947780217
-
New decidability results for fragments of first-order logic and application to cryptographic protocols
-
Proc. 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), Valencia, Spain, June To appear
-
H. Comon-Lundh and V. Cortier. New decidability results for fragments of first-order logic and application to cryptographic protocols. In Proc. 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), Valencia, Spain, June 2003, volume 2706 of LNCS. To appear.
-
(2003)
LNCS
, vol.2706
-
-
Comon-Lundh, H.1
Cortier, V.2
-
10
-
-
85008027756
-
Complexity and expressive power of logic programming
-
IEEE Computer Society
-
E. Dantsin, T. Eiter, G. Gottlob, and A. Voronkov. Complexity and expressive power of logic programming. In CCC'97, pages 82-101. IEEE Computer Society, 1997.
-
(1997)
CCC'97
, pp. 82-101
-
-
Dantsin, E.1
Eiter, T.2
Gottlob, G.3
Voronkov, A.4
-
14
-
-
0020889144
-
On the Security of Multi-Party Ping-Pong Protocols
-
S. Even and O. Goldreich. On the Security of Multi-Party Ping-Pong Protocols. In FOCS'83, pages 34-39, 1983.
-
(1983)
FOCS'83
, pp. 34-39
-
-
Even, S.1
Goldreich, O.2
-
16
-
-
84874721799
-
On the decidability of cryptographic protocols with open-ended data structures
-
CONCUR 2002, Springer-Verlag
-
R. Küsters. On the decidability of cryptographic protocols with open-ended data structures. In CONCUR 2002, LNCS 2421, pages 515-530. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2421
, pp. 515-530
-
-
Küsters, R.1
-
17
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Computer Society Press
-
C. Meadows. Open issues in formal methods for cryptographic protocol analysis. In DISCEX 2000, pages 237-250. IEEE Computer Society Press, 2000.
-
(2000)
DISCEX 2000
, pp. 237-250
-
-
Meadows, C.1
-
18
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
ACM Press
-
J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166-175. ACM Press, 2001.
-
(2001)
CCS 2001
, pp. 166-175
-
-
Millen, J.K.1
Shmatikov, V.2
-
19
-
-
0034822801
-
Protocol Insecurity with Finite Number of Sessions is NP-complete
-
M. Rusinowitch and M. Turuani. Protocol Insecurity with Finite Number of Sessions is NP-complete. In CSFW-14, pages 174-190, 2001.
-
(2001)
CSFW-14
, pp. 174-190
-
-
Rusinowitch, M.1
Turuani, M.2
|