-
1
-
-
35048822401
-
Deciding knowledge in security protocols under equational theories
-
Proc. 31st Int. Coll. Automata, Languages, and Programming (ICALP 2004), Turku, Finland, July. Springer
-
M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. In Proc. 31st Int. Coll. Automata, Languages, and Programming (ICALP 2004), volume 3142 of LNCS, pages 46-58, Turku, Finland, July 2004. Springer.
-
(2004)
LNCS
, vol.3142
, pp. 46-58
-
-
Abadi, M.1
Cortier, V.2
-
3
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
Jan.
-
M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: The spi calculus. Information and Computation, 148(1): 1-70, Jan. 1999.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
85083027758
-
Reconciling two views of cryptography (The computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (The computational soundness of formal encryption). Journal of Cryptology, 15(2): 103-127, 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
5
-
-
28144460900
-
-
Private communication
-
M. Baudet. Private communication. 2005.
-
(2005)
-
-
Baudet, M.1
-
6
-
-
0041967380
-
An NP decision procedure for protocol insecurity with xor
-
Y. Chevalier, R. Kuester, M. Rusinowitch, and M. Turani. An NP decision procedure for protocol insecurity with xor. In Proceedings of the 18th Annual IEEE Symposium on Logic In Computer Science (LICS'03), pages 261-270, 2003.
-
(2003)
Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03)
, pp. 261-270
-
-
Chevalier, Y.1
Kuester, R.2
Rusinowitch, M.3
Turani, M.4
-
7
-
-
35048861399
-
Intruder theories (ongoing work)
-
Foundations of Software Science and Computation Structures (FoSSaCS'04). Springer
-
H. Comon-Lundh. Intruder theories (ongoing work). In Foundations of Software Science and Computation Structures (FoSSaCS'04), volume 2987 of LNCS, pages 1-4. Springer, 2004.
-
(2004)
LNCS
, vol.2987
, pp. 1-4
-
-
Comon-Lundh, H.1
-
9
-
-
28144461037
-
Easy intruder deductions
-
Laboratoire Spécification et Vérification, ENS de Cachan, France
-
H. Comon-Lundh and R. Treinen. Easy intruder deductions. Technical Report LSV-03-8, Laboratoire Spécification et Vérification, ENS de Cachan, France, 2003.
-
(2003)
Technical Report
, vol.LSV-03-8
-
-
Comon-Lundh, H.1
Treinen, R.2
-
10
-
-
14844335720
-
A decision procedure for the verification of security protocols with explicit destructors
-
Washington, D.C., USA, October. ACM Press
-
S. Delaune and F. Jacquemard. A decision procedure for the verification of security protocols with explicit destructors. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04), pages 278-287, Washington, D.C., USA, October 2004. ACM Press.
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 278-287
-
-
Delaune, S.1
Jacquemard, F.2
-
12
-
-
0028385109
-
Three systems for cryptographic protocol analysis
-
Spring
-
R. Kemmerer, C. Meadows, and J. Millen. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, Spring 1994.
-
(1994)
Journal of Cryptology
, vol.7
, Issue.2
, pp. 79-130
-
-
Kemmerer, R.1
Meadows, C.2
Millen, J.3
-
13
-
-
23144432349
-
Analysis of an electronic voting protocol in the applied pi-calculus
-
M. Sagiv, editor, Programming Languages and Systems -Proceedings of the 14th European Symposium on Programming (ESOP'05), Edinburgh, U.K., April. Springer
-
S. Kremer and M. D. Ryan. Analysis of an electronic voting protocol in the applied pi-calculus. In M. Sagiv, editor, Programming Languages and Systems -Proceedings of the 14th European Symposium on Programming (ESOP'05), volume 3444 of LNCS, pages 186-200, Edinburgh, U.K., April 2005. Springer.
-
(2005)
LNCS
, vol.3444
, pp. 186-200
-
-
Kremer, S.1
Ryan, M.D.2
-
14
-
-
24944560619
-
Intruder deduction for ac-like equational theories with homomorphisms
-
Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), Nara, Japan, April. Springer
-
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for ac-like equational theories with homomorphisms. In Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), volume 3467 of LNCS, pages 308-322, Nara, Japan, April 2005. Springer.
-
(2005)
LNCS
, vol.3467
, pp. 308-322
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
-
15
-
-
0032218226
-
A probabilistic poly-time framework for protocol analysis
-
P. Lincoln, J. Mitchell, M. Mitchell, and A. Scedrov. A probabilistic poly-time framework for protocol analysis. In Proceedings of the Fifth ACM Conference on Computer and Communications Security, pages 112-121, 1998.
-
(1998)
Proceedings of the Fifth ACM Conference on Computer and Communications Security
, pp. 112-121
-
-
Lincoln, P.1
Mitchell, J.2
Mitchell, M.3
Scedrov, A.4
-
16
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Tools and Algorithms for the Construction and Analysis of Systems. Springer
-
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of LNCS, pages 147-166. Springer, 1996.
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
17
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6(1-2):85-128, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.C.1
-
18
-
-
0005301490
-
On data banks and privacy homomorphisms
-
R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors. Academic Press
-
R. L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks and privacy homomorphisms. In R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Foundations of Secure Computation, pages 169-180. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 169-180
-
-
Rivest, R.L.1
Adleman, L.2
Dertouzos, M.L.3
|