-
1
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
CAV. Etessami K., and Rajamani S.K. (Eds)
-
Armando A., Basin D.A., Boichut Y., Chevalier Y., Compagna L., Cuéllar J., Drielsma P.H., Héam P.-C., Kouchnarenko O., Mantovani J., Mödersheim S., von Oheimb D., Rusinowitch M., Santiago J., Turuani M., Viganò L., and Vigneron L. The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami K., and Rajamani S.K. (Eds). CAV. Lecture Notes in Computer Science 3576 (2005) 281-285
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.A.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuéllar, J.6
Drielsma, P.H.7
Héam, P.-C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
2
-
-
0346205107
-
Unification theory
-
Robinson A., and Voronkov A. (Eds), Elsevier Science
-
Baader F., and Snyder W. Unification theory. In: Robinson A., and Voronkov A. (Eds). Handbook of Automated Reasoning, Volume 1 (2001), Elsevier Science 445-532
-
(2001)
Handbook of Automated Reasoning, Volume 1
, pp. 445-532
-
-
Baader, F.1
Snyder, W.2
-
3
-
-
33646262130
-
Algebraic intruder deductions
-
LPAR. Sutcliffe G., and Voronkov A. (Eds)
-
Basin D.A., Mödersheim S., and Viganò L. Algebraic intruder deductions. In: Sutcliffe G., and Voronkov A. (Eds). LPAR. Lecture Notes in Computer Science 3835 (2005) 549-564
-
(2005)
Lecture Notes in Computer Science
, vol.3835
, pp. 549-564
-
-
Basin, D.A.1
Mödersheim, S.2
Viganò, L.3
-
4
-
-
34250827578
-
-
Baugher, M., B. Weis, T. Hardjono and H. Harney, The group domain of intepretation, in: Internet Engineering Task Force, RFC 3547, 2003
-
-
-
-
5
-
-
0034822279
-
-
Blanchet, B., An efficient cryptographic protocol verifier based on prolog rules., in: Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-14) (2001), pp. 82-96
-
-
-
-
6
-
-
0037190144
-
Maude: specification and programming in rewriting logic
-
Clavel M., Durán F., Eker S., Lincoln P., Martí-Oliet N., Meseguer J., and Quesada J. Maude: specification and programming in rewriting logic. Theoretical Computer Science 285 (2002) 187-243
-
(2002)
Theoretical Computer Science
, vol.285
, pp. 187-243
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Quesada, J.7
-
7
-
-
34250867750
-
-
Cremers, C., "Scyther - Semantics and Verification of Security Protocols," Ph.D. dissertation, Eindhoven University of Technology (2006)
-
-
-
-
8
-
-
84858564688
-
Decidable matching for convergent systems (preliminary version)
-
11th International Conference on Automated Deduction. Kapur D. (Ed). (CADE-11)
-
Dershowitz N., Mitra S., and Sivakumar G. Decidable matching for convergent systems (preliminary version). In: Kapur D. (Ed). 11th International Conference on Automated Deduction. (CADE-11). Lecture Notes in Computer Science 607 (1992) 589-602
-
(1992)
Lecture Notes in Computer Science
, vol.607
, pp. 589-602
-
-
Dershowitz, N.1
Mitra, S.2
Sivakumar, G.3
-
10
-
-
33750477656
-
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
-
Escobar S., Meadows C., and Meseguer J. A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theoretical Computer Science 367 (2006) 162-202
-
(2006)
Theoretical Computer Science
, vol.367
, pp. 162-202
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
12
-
-
0033683193
-
-
Heather, J., G. Lowe and S. Schneider, How to prevent type flaw attacks on security protocols, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop (2000), pp. 255-268
-
-
-
-
13
-
-
85035020357
-
Canonical forms and unification
-
5th Conference on Automated Deduction. Bibel W., and Kowalski R. (Eds)
-
Hullot J. Canonical forms and unification. In: Bibel W., and Kowalski R. (Eds). 5th Conference on Automated Deduction. Lecture Notes in Computer Science 87 (1980) 318-334
-
(1980)
Lecture Notes in Computer Science
, vol.87
, pp. 318-334
-
-
Hullot, J.1
-
14
-
-
34250840918
-
-
Kapur, D., P. Narendran and L. Wang, An E-unification algorithm for analyzing protocols that use modular exponentiation, Technical Report TR-03-2, CS Dept. SUNY Albany (2003)
-
-
-
-
15
-
-
0342880800
-
Applying formal methods to the analysis of a key management protocol
-
Meadows C. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security 1 (1992)
-
(1992)
Journal of Computer Security
, vol.1
-
-
Meadows, C.1
-
16
-
-
0030084918
-
The NRL Protocol Analyzer: An overview
-
Meadows C. The NRL Protocol Analyzer: An overview. The Journal of Logic Programming 26 (1996) 113-131
-
(1996)
The Journal of Logic Programming
, vol.26
, pp. 113-131
-
-
Meadows, C.1
-
17
-
-
27844540827
-
Specification of the Group Domain of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer
-
Meadows C., Cervesato I., and Syverson P. Specification of the Group Domain of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. Journal of Computer Security 12 (2004) 893-932
-
(2004)
Journal of Computer Security
, vol.12
, pp. 893-932
-
-
Meadows, C.1
Cervesato, I.2
Syverson, P.3
-
18
-
-
34250819628
-
-
Meadows, C. and P. Narendran, A unification algorithm for the group Diffie-Hellman protocol, in: Proc. Workshop on Issues in the Theory of Security WITS 2002, 2002
-
-
-
-
19
-
-
0027113376
-
Conditional rewriting logic as a unified model of concurrency
-
Meseguer J. Conditional rewriting logic as a unified model of concurrency. Theoretical Computer Science 96 (1992) 73-155
-
(1992)
Theoretical Computer Science
, vol.96
, pp. 73-155
-
-
Meseguer, J.1
-
20
-
-
0033741481
-
Formal characterization and automated analysis of known-pair and chosen-text attacks
-
Stubblebine S., and Meadows C. Formal characterization and automated analysis of known-pair and chosen-text attacks. IEEE Journal on Selected Areas in Communications 18 (2000) 571-581
-
(2000)
IEEE Journal on Selected Areas in Communications
, vol.18
, pp. 571-581
-
-
Stubblebine, S.1
Meadows, C.2
|