-
1
-
-
84874678490
-
On name generation and set-based analysis in the Dolev-Yao model
-
CONCUR, Springer
-
Roberto M. Amadio and Witold Charatonik, On name generation and set-based analysis in the Dolev-Yao model, CONCUR, Lecture Notes in Computer Science, vol. 2421, Springer, 2002, pp. 499-514.
-
(2002)
Lecture Notes in Computer Science
, vol.2421
, pp. 499-514
-
-
Amadio, R.M.1
Charatonik, W.2
-
4
-
-
14044264137
-
The authentication protocol
-
Defence Research Agency, Malvern, UK
-
J.A. Bull and D.J. Otway, The authentication protocol, Technical Report DRA/CIS3/PROJ/ CORBA/SC/1/CSM/436-04/-03, Defence Research Agency, Malvern, UK, 1997.
-
(1997)
Technical Report
, vol.DRA-CIS3-PROJ- CORBA-SC-1-CSM-436-04-03
-
-
Bull, J.A.1
Otway, D.J.2
-
5
-
-
18544387122
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, FSTTCS, 2003.
-
(2003)
FSTTCS
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
6
-
-
27344447961
-
An NP decision procedure for protocol insecurity with XOR
-
_, An NP decision procedure for protocol insecurity with XOR, LICS, 2003.
-
(2003)
LICS
-
-
-
8
-
-
0042467908
-
Intruder deductions, constraint solving and indecurity decision in presence of exclusive or
-
H. Comon-Lundh and V. Shmatikov, Intruder deductions, constraint solving and indecurity decision in presence of exclusive or, LICS, 2003.
-
(2003)
LICS
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
10
-
-
0003515826
-
Undecidability of bounded security protocols
-
N.A. Durgin, P.D. Lincoln, J.C. Mitchell, and A. Scedrov, Undecidability of bounded security protocols, Workshop on Formal Methods and Security Protocols (FMSP'99), 1999.
-
(1999)
Workshop on Formal Methods and Security Protocols (FMSP'99)
-
-
Durgin, N.A.1
Lincoln, P.D.2
Mitchell, J.C.3
Scedrov, A.4
-
11
-
-
0004170287
-
On the security of multi-party ping-pong protocols
-
Israel Institute of Technology
-
S. Even and O. Goldreich, On the security of multi-party ping-pong protocols. Technical Report 285, Israel Institute of Technology, 1983.
-
(1983)
Technical Report
, vol.285
-
-
Even, S.1
Goldreich, O.2
-
12
-
-
27344454831
-
Automata-based analysis of recursive cryptographic protocols
-
CAU Kiel
-
Ralf Küsters and Thomas Wilke, Automata-based analysis of recursive cryptographic protocols, Technical Report IFI 0311, CAU Kiel, 2003.
-
(2003)
Technical Report
, vol.IFI 0311
-
-
Küsters, R.1
Wilke, T.2
-
13
-
-
35048832860
-
Automata-based analysis of recursive cryptographic protocols
-
STACS, Springer
-
_, Automata-based analysis of recursive cryptographic protocols, STACS, Lecture Notes in Computer Science, vol. 2996, Springer, 2004, pp. 382-393.
-
(2004)
Lecture Notes in Computer Science
, vol.2996
, pp. 382-393
-
-
-
14
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: Emerging issues and trends
-
Catherine Meadows, Formal methods for cryptographic protocol analysis: Emerging issues and trends, IEEE Journal on Selected Areas in Communication 21 (2003), no. 1, 44-54.
-
(2003)
IEEE Journal on Selected Areas in Communication
, vol.21
, Issue.1
, pp. 44-54
-
-
Meadows, C.1
-
16
-
-
0037453396
-
Protocol insecurity with a finite number of sessions, composed keys is NP-complete
-
Michael Rusinowitch and Mathieu Turuani, Protocol insecurity with a finite number of sessions, composed keys is NP-complete, Theor. Comput. Sci. 1-3 (2003), no. 299, 451-475.
-
(2003)
Theor. Comput. Sci.
, vol.1-3
, Issue.299
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
-
17
-
-
27344453175
-
Regular protocols and attacks with regular knowledge
-
LNCS, Springer, to appear
-
Tomasz Truderung, Regular protocols and attacks with regular knowledge. Proceedings of CADE 2005, LNCS, Springer, 2005, to appear.
-
(2005)
Proceedings of CADE 2005
-
-
Truderung, T.1
|