-
1
-
-
35048822401
-
Deciding knowledge in security protocols under equational theories
-
LNCS 3142, Springer
-
M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. In Proceedings of ICALP'2004, LNCS 3142, pp. 46-58. Springer, 2004.
-
(2004)
Proceedings of ICALP'2004
, pp. 46-58
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
28144451656
-
Deciding knowledge in security protocols under (many more) equational theories
-
IEEE Computer Society Press
-
M. Abadi and V. Cortier. Deciding knowledge in security protocols under (many more) equational theories. In Proceedings of CSFW'05, pp. 62-76. IEEE Computer Society Press, 2005.
-
(2005)
Proceedings of CSFW'05
, pp. 62-76
-
-
Abadi, M.1
Cortier, V.2
-
3
-
-
84954313527
-
Automatic SAT-compilation of protocol insecurity problems via reduction to planning
-
LNCS 2529. Springer
-
A. Armando and L. Compagna. Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. In Proceedings of FORTE 2002, LNCS 2529, pp. 210-225. Springer, 2002.
-
(2002)
Proceedings of FORTE 2002
, pp. 210-225
-
-
Armando, A.1
Compagna, L.2
-
5
-
-
0030078047
-
Unification in the union of disjoint equational theories: Combining decision procedures
-
F. Baader and K.U. Schulz. Unification in the union of disjoint equational theories: Combining decision procedures. Journal of Symbolic Computation, 21:211-243, 1996.
-
(1996)
Journal of Symbolic Computation
, vol.21
, pp. 211-243
-
-
Baader, F.1
Schulz, K.U.2
-
8
-
-
18744415053
-
Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols
-
ACM Press
-
D. Basin, S. Mödersheim, and L. Viganò. Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In Proceedings of CCS'03, pp. 335-344. ACM Press, 2003.
-
(2003)
Proceedings of CCS'03
, pp. 335-344
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
9
-
-
33745455203
-
Algebraic intruder deductions (extended version)
-
Dep. of Computer Science, ETH Zurich
-
D. Basin, S. Mödersheim, and L. Viganò. Algebraic Intruder Deductions (Extended Version). Technical Report 485, Dep. of Computer Science, ETH Zurich, 2005. Available at www.infsec.ethz.ch.
-
(2005)
Technical Report
, vol.485
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
10
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
D. Basin, S. Mödersheim, and L. Viganò. OFMC: A symbolic model checker for security protocols. International Journal of Information Security, 4(3):181-208, 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
11
-
-
84874713281
-
A framework for the analysis of security protocols
-
LNCS 2421. Springer
-
M. Boreale and M. G. Buscemi. A framework for the analysis of security protocols. In Proceedings of CONCUR 2002, LNCS 2421, pp. 483-498. Springer, 2002.
-
(2002)
Proceedings of CONCUR 2002
, pp. 483-498
-
-
Boreale, M.1
Buscemi, M.G.2
-
12
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
IEEE Computer Society Press
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In Proceedings of LICS'03, pp. 261-270. IEEE Computer Society Press, 2003.
-
(2003)
Proceedings of LICS'03
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
13
-
-
35248865266
-
Deciding the security of protocols with diffie-hellman exponentiation and products in exponents
-
LNCS 2914. Springer
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In Proceedings of FST TCS'03, LNCS 2914, pp. 124-135. Springer, 2003.
-
(2003)
Proceedings of FST TCS'03
, pp. 124-135
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
16
-
-
24944569389
-
The finite variant property: How to get rid of some algebraic properties
-
LNCS 3467. Springer
-
H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. In Proceedings of RTA '05, LNCS 3467, pp. 294-307. Springer, 2005.
-
(2005)
Proceedings of RTA '05
, pp. 294-307
-
-
Comon-Lundh, H.1
Delaune, S.2
-
18
-
-
14844335720
-
A decision procedure for the verification of security protocols with explicit destructors
-
ACM Press
-
S. Delaune and F. Jacquemard. A decision procedure for the verification of security protocols with explicit destructors. In Proceedings of CCS'04, pp. 278-287. ACM Press, 2004.
-
(2004)
Proceedings of CCS'04
, pp. 278-287
-
-
Delaune, S.1
Jacquemard, F.2
-
21
-
-
33745469606
-
-
IETF: The Internet Engineering Task Force. http://www.ietf.org.
-
-
-
-
22
-
-
0001686885
-
Completion of a set of rules modulo a set of equations
-
J.-P. Jouannaud and H. Kirchner. Completion of a set of rules modulo a set of equations. SIAM Journal of Computing, 15(4):1155-1194, 1986.
-
(1986)
SIAM Journal of Computing
, vol.15
, Issue.4
, pp. 1155-1194
-
-
Jouannaud, J.-P.1
Kirchner, H.2
-
23
-
-
51149098006
-
An E-unification algorithm for analyzing protocols that use modular exponentiation
-
LNCS 2706. Springer
-
D. Kapur, P. Narendran, and L. Wang. An E-unification algorithm for analyzing protocols that use modular exponentiation. In Proceedings of RTA '03, LNCS 2706, pp. 165-179. Springer, 2003.
-
(2003)
Proceedings of RTA '03
, pp. 165-179
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
24
-
-
24944560619
-
Intruder deduction for AC-like equational theories with homomorphisms
-
LNCS 3467. Springer
-
P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for AC-like equational theories with homomorphisms. In Proceedings of RTA '05, LNCS 3467, pp. 308-322. Springer, 2005.
-
(2005)
Proceedings of RTA '05
, pp. 308-322
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
-
25
-
-
0031633395
-
Casper: A compiler for the analysis of security protocols
-
G. Lowe. Casper: a Compiler for the Analysis of Security Protocols. Journal of Computer Security, 6(1):53-84, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1
, pp. 53-84
-
-
Lowe, G.1
-
26
-
-
33745436010
-
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
-
to appear
-
J. Meseguer and P. Thati. Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Journal of Higher-Order and Symbolic Computation, to appear.
-
Journal of Higher-order and Symbolic Computation
-
-
Meseguer, J.1
Thati, P.2
-
27
-
-
70349714960
-
Symbolic protocol analysis with products and Diffie-Hellman exponentiation
-
IEEE Computer Society Press
-
J. K. Millen and V. Shmatikov. Symbolic protocol analysis with products and Diffie-Hellman exponentiation. In Proceedings of CSFW'03, pp. 47-61. IEEE Computer Society Press, 2003.
-
(2003)
Proceedings of CSFW'03
, pp. 47-61
-
-
Millen, J.K.1
Shmatikov, V.2
-
28
-
-
0040199167
-
The undecidability of the da unification problem
-
J. Siekmann and P. Szabó. The undecidability of the DA unification problem. Journal of Symbolic Computation, 54(2):402-414, 1989.
-
(1989)
Journal of Symbolic Computation
, vol.54
, Issue.2
, pp. 402-414
-
-
Siekmann, J.1
Szabó, P.2
|