-
1
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
R.M. Amadio, D. Lugiez, and V. Vanackere. On the symbolic reduction of processes with cryptographic functions. Theoretical Computer Science, 290(1):695-740, 2002.
-
(2002)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 695-740
-
-
Amadio, R.M.1
Lugiez, D.2
Vanackere, V.3
-
2
-
-
84937567009
-
The AVISS security protocol analysis tool
-
LNCS 2404. Springer
-
A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Mödersheim, M. Rusinowitch, M. Turuani, L. Viganò, and L. Vigneron. The AVISS Security Protocol Analysis Tool. In CAV 2002, LNCS 2404, pages 349-353. Springer, 2002.
-
(2002)
CAV 2002
, pp. 349-353
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Mödersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Viganò, L.9
Vigneron, L.10
-
3
-
-
0031650188
-
Asynchronous protocols for optimistic fair exchange
-
N. Asokan, V. Shoup, and M. Waidner. Asynchronous protocols for optimistic fair exchange. In Security&Privacy 2002, pages 86-99, 1998.
-
(1998)
Security&Privacy 2002
, pp. 86-99
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
4
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
LNCS 2808. Springer
-
D. Basin, S. Mödersheim, and L. Viganò. An On-The-Fly Model-Checker for Security Protocol Analysis. In ESORICS 2003, LNCS 2808, pages 253-270. Springer, 2003.
-
(2003)
ESORICS 2003
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
5
-
-
0035751922
-
Inductive methods and contract-signing protocols
-
ACM Press
-
R. Chadha, M.I. Kanovich, and A.Scedrov. Inductive methods and contract-signing protocols. In CCS 2001, pages 176-185. ACM Press, 2001.
-
(2001)
CCS 2001
, pp. 176-185
-
-
Chadha, R.1
Kanovich, M.I.2
Scedrov, A.3
-
6
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
IEEE, Computer Society Press
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In LICS 2003, pages 261-270. IEEE, Computer Society Press, 2003.
-
(2003)
LICS 2003
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
7
-
-
84944686372
-
A tool for lazy verification of security protocols
-
IEEE CS Press
-
Y. Chevalier and L. Vigneron. A Tool for Lazy Verification of Security Protocols. In ASE 2001, pages 373-376. IEEE CS Press, 2001.
-
(2001)
ASE 2001
, pp. 373-376
-
-
Chevalier, Y.1
Vigneron, L.2
-
8
-
-
27244456479
-
The ASW protocol revisited: A unified view
-
P. H. Drielsma and S. Mödersheim. The ASW Protocol Revisited: A Unified View. In ARSPA, 2004.
-
(2004)
ARSPA
-
-
Drielsma, P.H.1
Mödersheim, S.2
-
9
-
-
84957060126
-
Abuse-free optimistic contract signing
-
LNCS 1666, Springer-Verlag
-
J.A. Garay, M. Jakobsson, and P. MacKenzie. Abuse-free optimistic contract signing. In CRYPTO'99, LNCS 1666, pages 449-466. Springer-Verlag, 1999.
-
(1999)
CRYPTO'99
, pp. 449-466
-
-
Garay, J.A.1
Jakobsson, M.2
MacKenzie, P.3
-
10
-
-
27244444696
-
A constraint-based algorithm for contract-signing protocols
-
IFI 0503, CAU Kiel, Germany
-
D. Kähler and R. Küsters. A Constraint-Based Algorithm for Contract-Signing Protocols. Technical report, IFI 0503, CAU Kiel, Germany, 2005. Available from http://www.informatik.uni-kiel.de/reports/2005/0503.html
-
(2005)
Technical Report
-
-
Kähler, D.1
Küsters, R.2
-
11
-
-
24144437134
-
Deciding properties of contract-signing protocols
-
LNCS 3404, Springer
-
D. Kähler, R. Küsters, and Th. Wilke. Deciding Properties of Contract-Signing Protocols. In STACS 2005, LNCS 3404, pages 158-169. Springer, 2005.
-
(2005)
STACS 2005
, pp. 158-169
-
-
Kähler, D.1
Küsters, R.2
Wilke, Th.3
-
12
-
-
84948779843
-
Game analysis of abuse-free contract signing
-
IEEE Computer Society
-
S. Kremer and J.-F. Raskin. Game analysis of abuse-free contract signing. In CSFW 2002, pages 206-220. IEEE Computer Society, 2002.
-
(2002)
CSFW 2002
, pp. 206-220
-
-
Kremer, S.1
Raskin, J.-F.2
-
13
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
ACM Press
-
J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166-175. ACM Press, 2001.
-
(2001)
CCS 2001
, pp. 166-175
-
-
Millen, J.K.1
Shmatikov, V.2
-
14
-
-
0037453396
-
Protocol insecurity with a finite number of sessions, composed keys is NP-complete
-
M. Rusinowitch and M. Turuani. Protocol insecurity with a finite number of sessions, composed keys is NP-complete. Theoretical Computer Science, 299(1-3):451-475, 2003.
-
(2003)
Theoretical Computer Science
, vol.299
, Issue.1-3
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
-
15
-
-
0037076869
-
Finite-state analysis of two contract signing protocols
-
V. Shmatikov and J.C. Mitchell. Finite-state analysis of two contract signing protocols. Theoretical Computer Science, 283(2):419-450, 2002.
-
(2002)
Theoretical Computer Science
, vol.283
, Issue.2
, pp. 419-450
-
-
Shmatikov, V.1
Mitchell, J.C.2
|