-
1
-
-
26444497860
-
The AVISPA Tool for the automated validation of internet security protocols and applications
-
+05] CAV'2005, Edinburgh, Scotland. Springer
-
+05] A. Armando, D. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santos Santiago, M. Turuani, L. Viganò, and L. Vigneron. The AVISPA Tool for the automated validation of internet security protocols and applications. In CAV'2005, volume 3576 of LNCS, pages 281-285, Edinburgh, Scotland, 2005. Springer.
-
(2005)
LNCS
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Héam, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.S.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
2
-
-
84888849747
-
Trace reconstruction
-
[BG06] LIFC - Laboratoire d'Informatique de l'Université de Franche Comtéand IRISA / Université de Rennes
-
[BG06] Y. Boichut and Th. Genet. Trace reconstruction. Research Report RR2006-02, LIFC - Laboratoire d'Informatique de l'Université de Franche Comtéand IRISA / Université de Rennes, 2006. http://lifc.univ- fcomte.fr/publis/papers/Year/2006.html.
-
(2006)
Research Report
, vol.RR2006-02
-
-
Boichut, Y.1
Genet, Th.2
-
3
-
-
33749413630
-
Automatic verification of security protocols using approximations
-
[BHK05] INRIA-Lorraine - CASSIS Project, October
-
[BHK05] Y. Boichut, P.-C. Héam, and O. Kouchnarenko. Automatic Verification of Security Protocols Using Approximations. Research Report RR-5727, INRIA-Lorraine - CASSIS Project, October 2005.
-
(2005)
Research Report
, vol.RR-5727
-
-
Boichut, Y.1
Héam, P.-C.2
Kouchnarenko, O.3
-
4
-
-
84874257101
-
An overview of elan
-
+98] ENTCS, Pont-à-mousson (France). Elsevier
-
+98] P. Borovanský, C. Kirchner, H. Kirchner, P.-E. Moreau, and C. Ringeissen. An overview of elan. In Proc. 2nd WRLA, ENTCS, Pont-à-mousson (France), 1998. Elsevier.
-
(1998)
Proc. 2nd WRLA
-
-
Borovanský, P.1
Kirchner, C.2
Kirchner, H.3
Moreau, P.-E.4
Ringeissen, C.5
-
6
-
-
3042768691
-
Maude: Specification and programming in rewriting logic
-
+01]
-
+01] Manuel Clavel, Francisco Durán, Steven Eker, Patrick Lincoln, Narciso Martí-Oliet, José Meseguer, and José F. Quesada. Maude: Specification and programming in rewriting logic. Theoretical Computer Science, 2001.
-
(2001)
Theoretical Computer Science
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Quesada, J.F.7
-
7
-
-
0004060205
-
-
+02]
-
+02] H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree automata techniques and applications. http://www.grappa.univ-lille3.fr/tata/, 2002.
-
(2002)
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Lugiez, D.5
Tison, S.6
Tommasi, M.7
-
8
-
-
15544365037
-
Reachability analysis over term rewriting systems
-
[FGVTT04]
-
[FGVTT04] G. Feuillade, T. Genet, and V. Viet Triem Tong. Reachability Analysis over Term Rewriting Systems. JAR, 33 (3-4):341-383, 2004.
-
(2004)
JAR
, vol.33
, Issue.3-4
, pp. 341-383
-
-
Feuillade, G.1
Genet, T.2
Tong, V.V.T.3
-
9
-
-
84958742938
-
Decidable approximations of sets of descendants and sets of normal forms
-
[Gen98] Proc. 9th RTA Conf., Tsukuba (Japan), Springer-Verlag
-
[Gen98] T. Genet. Decidable approximations of sets of descendants and sets of normal forms. In Proc. 9th RTA Conf., Tsukuba (Japan), volume 1379 of LNCS, pages 151-165. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1379
, pp. 151-165
-
-
Genet, T.1
-
10
-
-
7044247196
-
The new WALOMEISTER loop at work
-
[GHLS03] F. Baader, editor, Proc. CADE'2003. Springer-Verlag
-
[GHLS03] J.-M. Gaillourdet, Th. Hillenbrand, B. Löchner, and H. Spies. The new WALOMEISTER loop at work. In F. Baader, editor, Proc. CADE'2003, volume 2741 of LNAI, pages 317-321. Springer-Verlag, 2003.
-
(2003)
LNAI
, vol.2741
, pp. 317-321
-
-
Gaillourdet, J.-M.1
Hillenbrand, Th.2
Löchner, B.3
Spies, H.4
-
11
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
[GK00] Proc. CADE'2000. Springer-Verlag
-
[GK00] T. Genet and F. Klay. Rewriting for Cryptographic Protocol Verification. In In Proc. CADE'2000, volume 1831 of LNAI. Springer-Verlag, 2000.
-
(2000)
LNAI
, vol.1831
-
-
Genet, T.1
Klay, F.2
-
12
-
-
15544370467
-
Verification of copy protection cryptographic protocol using approximations of term rewriting systems
-
[GTTVTT03]
-
[GTTVTT03] T. Genet, Y.-M. Tang-Talpin, and V. Viet Triem Tong. Verification of Copy Protection Cryptographic Protocol using Approximations of Term Rewriting Systems. In In Proc. of WITS'2003, 2003.
-
(2003)
Proc. of WITS'2003
-
-
Genet, T.1
Tang-Talpin, Y.-M.2
Tong, V.V.T.3
-
13
-
-
0011672242
-
Linear generalized semi-monadic rewrite systems effectively preserve recognizability
-
[GV98]
-
[GV98] P. Gyenizse and S. Vágvölgyi. Linear Generalized Semi-Monadic Rewrite Systems Effectively Preserve Recognizability. TCS, 194(1-2):87-122, 1998.
-
(1998)
TCS
, vol.194
, Issue.1-2
, pp. 87-122
-
-
Gyenizse, P.1
Vágvölgyi, S.2
-
14
-
-
84888832606
-
-
[GVTT00] Timbuk 2.0 - a Tree Automata Library. IRISA / Université de Rennes 1
-
[GVTT00] T. Genet and V. Viet Triem Tong. Timbuk 2.0 - a Tree Automata Library. IRISA / Université de Rennes 1, 2000. http://www.irisa.fr/lande/ genet/timbuk/.
-
(2000)
-
-
Genet, T.1
Tong, V.V.T.2
-
15
-
-
84937398672
-
Reachability analysis of term rewriting systems with timbuk
-
[GVTT01] Proc. 8th LPAR Conf., Havana (Cuba), Springer-Verlag
-
[GVTT01] T. Genet and Valérie Viet Triem Tong. Reachability Analysis of Term Rewriting Systems with timbuk. In Proc. 8th LPAR Conf., Havana (Cuba), volume 2250 of LNAI, pages 691-702. Springer-Verlag, 2001.
-
(2001)
LNAI
, vol.2250
, pp. 691-702
-
-
Genet, T.1
Tong, V.V.T.2
-
16
-
-
84957626754
-
Decidable approximations of term rewriting systems
-
[Jac96] H. Ganzinger, editor, Springer-Verlag
-
[Jac96] F. Jacquemard. Decidable approximations of term rewriting systems. In H. Ganzinger, editor, Proc. 7th RTA Conf., New Brunswick (New Jersey, USA), pages 362-376. Springer-Verlag, 1996.
-
(1996)
Proc. 7th RTA Conf., New Brunswick (New Jersey, USA)
, pp. 362-376
-
-
Jacquemard, F.1
-
17
-
-
0011137918
-
Abstracting cryptographic protocols with tree automata
-
[Mon99]
-
[Mon99] D. Monniaux. Abstracting Cryptographic Protocols with Tree Automata. In Proc. 6th SAS, Venezia (Italy), 1999.
-
(1999)
Proc. 6th SAS, Venezia (Italy)
-
-
Monniaux, D.1
-
18
-
-
33646265822
-
Automatic approximation for the verification of cryptographic protocols
-
[OCKS03] Proceedings of FASE'03, Springer-Verlag
-
[OCKS03] F. Oehl, G. Cécé, O. Kouchnarenko, and D. Sinclair. Automatic Approximation for the Verification of Cryptographic Protocols. In In Proceedings of FASE'03, volume 2629 of LNCS, pages 34-48. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2629
, pp. 34-48
-
-
Oehl, F.1
Cécé, G.2
Kouchnarenko, O.3
Sinclair, D.4
-
19
-
-
84937401763
-
Right-linear finite-path overlapping term rewriting systems effectively preserve recognizability
-
[TKS00] Proc. 11th RTA Conf., Norwich (UK). Springer-Verlag
-
[TKS00] T. Takai, Y. Kaji, and H. Seki. Right-linear finite-path overlapping term rewriting systems effectively preserve recognizability. In Proc. 11th RTA Conf., Norwich (UK), volume 1833 of LNCS. Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1833
-
-
Takai, T.1
Kaji, Y.2
Seki, H.3
|