-
1
-
-
0346205107
-
Unification theory
-
Robinson A., and Voronkov A. (Eds), Elsevier Science, Amsterdam (Chapter 8)
-
Baader F., and Snyder W. Unification theory. In: Robinson A., and Voronkov A. (Eds). Handbook of Automated Reasoning Vol. 1 (2001), Elsevier Science, Amsterdam 445-532 (Chapter 8)
-
(2001)
Handbook of Automated Reasoning
, vol.1
, pp. 445-532
-
-
Baader, F.1
Snyder, W.2
-
3
-
-
11944275908
-
Relating multiset rewriting and process algebras for security protocol analysis
-
Bistarelli S., Cervesato I., Lenzini G., and Martinelli F. Relating multiset rewriting and process algebras for security protocol analysis. J. Comput. Security 13 1 (2005) 3-47
-
(2005)
J. Comput. Security
, vol.13
, Issue.1
, pp. 3-47
-
-
Bistarelli, S.1
Cervesato, I.2
Lenzini, G.3
Martinelli, F.4
-
4
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society, Silver Spring, MD
-
Blanchet B. An efficient cryptographic protocol verifier based on prolog rules. 14th IEEE Computer Security Foundations Workshop (2001), IEEE Computer Society, Silver Spring, MD 82-96
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
5
-
-
35248865266
-
-
Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: 23rd Conf. on Foundations Software Technology and Theoretical Computer Science, Lecture Notes in Computer Science, Vol. 2914, Springer, Berlin, 2003, pp. 124-135.
-
-
-
-
6
-
-
0041967380
-
-
Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, An NP decision procedure for protocol insecurity with XOR, in: 18th Annu. IEEE Symp. Logic in Computer Science, 2003.
-
-
-
-
7
-
-
0037190144
-
Maude: specification and programming in rewriting logic
-
Clavel M., Durán F., Eker S., Lincoln P., Martí-Oliet N., Meseguer J., and Quesada J. Maude: specification and programming in rewriting logic. Theoret. Comput. Sci. 285 (2002) 187-243
-
(2002)
Theoret. Comput. Sci.
, vol.285
, pp. 187-243
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Quesada, J.7
-
8
-
-
0042467908
-
-
H. Comon-Lundh, V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive-or, in: 18th Annu. IEEE Symp. on Logic in Computer Science, 2003, pp. 271-280.
-
-
-
-
9
-
-
84858564688
-
-
N. Dershowitz, S. Mitra, G. Sivakumar, Decidable matching for convergent systems (preliminary version), in: D. Kapur (Ed.), 11th Internat. Conf. on Automated Deduction, Lecture Notes in Computer Science, Vol. 607, Springer, Berlin, 1992, pp. 589-602.
-
-
-
-
10
-
-
0020720357
-
On the security of public key protocols
-
Dolev D., and Yao A. On the security of public key protocols. IEEE Trans. Inform. Theory 29 2 (1983) 198-208
-
(1983)
IEEE Trans. Inform. Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
11
-
-
31844452704
-
A rewriting-based inference system for the NRL Protocol Analyzer: grammar generation
-
Küsters R., and Mitchell J. (Eds), ACM, New York
-
Escobar S., Meadows C., and Meseguer J. A rewriting-based inference system for the NRL Protocol Analyzer: grammar generation. In: Küsters R., and Mitchell J. (Eds). Proc. 2005 ACM Workshop on Formal Methods in Security Engineering (2005), ACM, New York 1-12
-
(2005)
Proc. 2005 ACM Workshop on Formal Methods in Security Engineering
, pp. 1-12
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
13
-
-
84937389998
-
-
T. Genet, F. Klay, Rewriting for cryptographic protocol verification, in: D.A. McAllester (Ed.), 17th Internat. Conf. on Automated Deduction, Lecture Notes in Computer Science, Vol. 1831, Springer, Berlin, 2000, pp. 271-290.
-
-
-
-
14
-
-
14844344837
-
A decision procedure for the existence of a rank function
-
Heather J., and Schneider S. A decision procedure for the existence of a rank function. J. Comput. Security 13 2 (2005) 317-344
-
(2005)
J. Comput. Security
, vol.13
, Issue.2
, pp. 317-344
-
-
Heather, J.1
Schneider, S.2
-
15
-
-
85035020357
-
-
J. Hullot, Canonical forms and unification, in: W. Bibel, R. Kowalski (Eds.), Fifth Conf. on Automated Deduction, Lecture Notes in Computer Science, Vol. 87, Springer, Berlin, 1980, pp. 318-334.
-
-
-
-
16
-
-
33750431255
-
Matching, Unification and Complexity
-
Kapur D., and Narendran P. Matching, Unification and Complexity. ACM SIGSAM Bulletin 21 4 (1987) 6-9
-
(1987)
ACM SIGSAM Bulletin
, vol.21
, Issue.4
, pp. 6-9
-
-
Kapur, D.1
Narendran, P.2
-
17
-
-
0342658605
-
-
G. Lowe, Breaking and fixing the Needham-Schroeder public-key protocol using FDR, in: Tools and Algorithms for Construction and Analysis of Systems, Lecture Notes in Computer Science, Vol. 1055, Springer, Berlin, 1996, pp. 147-166.
-
-
-
-
18
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
Meadows C. Applying formal methods to the analysis of a key management protocol. J. Comput. Security 1 1 (1992)
-
(1992)
J. Comput. Security
, vol.1
, Issue.1
-
-
Meadows, C.1
-
19
-
-
84949740740
-
-
C. Meadows, Analyzing the Needham-Schroeder public-key protocol: a comparison of two approaches, in: E. Bertino, H. Kurth, G. Martella, E. Montolivo (Eds.), Proc. Fourth European Symp. on Research in Computer Security, Lecture Notes in Computer Science, Vol. 1146, Springer, Berlin, 1996, pp. 351-364.
-
-
-
-
20
-
-
0029700221
-
Language generation and verification in the NRL Protocol Analyzer
-
IEEE Computer Society Press, Silver Spring, MD
-
Meadows C. Language generation and verification in the NRL Protocol Analyzer. Proc. Ninth IEEE Computer Security Foundations Workshop (1996), IEEE Computer Society Press, Silver Spring, MD 48-61
-
(1996)
Proc. Ninth IEEE Computer Security Foundations Workshop
, pp. 48-61
-
-
Meadows, C.1
-
21
-
-
0030084918
-
The NRL Protocol Analyzer: an overview
-
Meadows C. The NRL Protocol Analyzer: an overview. J. Logic Programming 26 2 (1996) 113-131
-
(1996)
J. Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
22
-
-
0033682446
-
Invariant generation techniques in cryptographic protocol analysis
-
IEEE Computer Society Press, Silver Spring, MD
-
Meadows C. Invariant generation techniques in cryptographic protocol analysis. Proc. 13th Computer Security Foundations Workshop (2000), IEEE Computer Society Press, Silver Spring, MD
-
(2000)
Proc. 13th Computer Security Foundations Workshop
-
-
Meadows, C.1
-
23
-
-
27844540827
-
Specification of the group domain of interpretation protocol using NPATRL and the NRL Protocol Analyzer
-
Meadows C., Cervesato I., and Syverson P. Specification of the group domain of interpretation protocol using NPATRL and the NRL Protocol Analyzer. J. Comput. Security 12 6 (2004) 893-932
-
(2004)
J. Comput. Security
, vol.12
, Issue.6
, pp. 893-932
-
-
Meadows, C.1
Cervesato, I.2
Syverson, P.3
-
24
-
-
0027113376
-
Conditional rewriting logic as a unified model of concurrency
-
Meseguer J. Conditional rewriting logic as a unified model of concurrency. Theoret. Comput. Sci. 96 1 (1992) 73-155
-
(1992)
Theoret. Comput. Sci.
, vol.96
, Issue.1
, pp. 73-155
-
-
Meseguer, J.1
-
25
-
-
84957873927
-
-
J. Meseguer, Membership algebra as a logical framework for equational specification, in: F. Parisi-Presicce (Ed.), Proc. WADT'97, Springer, Lecture Notes in Computer Science, Vol. 1376, Springer, Berlin, 1998, pp. 18-61.
-
-
-
-
26
-
-
31844437900
-
Symbolic reachability analysis using narrowing and its application to the verification of cryptographic protocols
-
Martí-Oliet J. (Ed), ENTCS, Elsevier, Amsterdam
-
Meseguer J., and Thati P. Symbolic reachability analysis using narrowing and its application to the verification of cryptographic protocols. In: Martí-Oliet J. (Ed). Proc. Fifth Internat. Workshop on Rewriting Logic and its Applications (2004), ENTCS, Elsevier, Amsterdam
-
(2004)
Proc. Fifth Internat. Workshop on Rewriting Logic and its Applications
-
-
Meseguer, J.1
Thati, P.2
-
27
-
-
0035751921
-
-
J. Millen, V. Shmatikov, Constraint solving for bounded-process cryptographic protocol analysis, in: Eighth ACM Conf. on Computer and Communications Security, 2001, pp. 166-175.
-
-
-
-
28
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Needham R., and Schroeder M. Using encryption for authentication in large networks of computers. Comm. ACM 21 12 (1978) 993-999
-
(1978)
Comm. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
29
-
-
84863913545
-
-
D. Peled, Ten years of partial order reduction, in: 10th Conf. on Computer-aided Verification, Lecture Notes in Computer Science, Vol. 1427, Springer, Berlin, 1998, pp. 17-28.
-
-
-
-
30
-
-
0033741481
-
Formal characterization and automated analysis of known-pair and chosen-text attacks
-
Stubblebine S., and Meadows C. Formal characterization and automated analysis of known-pair and chosen-text attacks. IEEE J. Selected Areas in Comm. 18 4 (2000) 571-581
-
(2000)
IEEE J. Selected Areas in Comm.
, vol.18
, Issue.4
, pp. 571-581
-
-
Stubblebine, S.1
Meadows, C.2
-
31
-
-
33750453977
-
-
TeReSe (Ed.), Term Rewriting Systems, Cambridge University Press, Cambridge, 2003.
-
-
-
-
32
-
-
84957640213
-
-
C. Weidenbach, Towards an automatic analysis of security protocols in first-order logic, in: H. Ganzinger (Ed.), 16th Internat. Conf. on Automated Deduction, Lecture Notes in Computer Science, Vol. 1632, Springer, Berlin, 1999, pp. 314-328.
-
-
-
|