-
1
-
-
0038504807
-
XML with Data Values: Typechecking Revisited
-
N. Alon, T. Milo, F. Neven, D. Suciu, and V. Vianu. XML with Data Values: Typechecking Revisited. In JCSS 66(4): 688-727 (2003).
-
(2003)
JCSS
, vol.66
, Issue.4
, pp. 688-727
-
-
Alon, N.1
Milo, T.2
Neven, F.3
Suciu, D.4
Vianu, V.5
-
2
-
-
1442267744
-
On Name Generation and Set-Based Analysis in the Dolev-Yao Model
-
R.M. Amadio and W. Charatonik. On Name Generation and Set-Based Analysis in the Dolev-Yao Model. In CONCUR 2002.
-
(2002)
CONCUR
-
-
Amadio, R.M.1
Charatonik, W.2
-
3
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
R.M. Amadio, D. Lugiez, and V. Vanackere. On the symbolic reduction of processes with cryptographic functions. Theoretical Computer Science, 290(1):695-740, 2002.
-
(2002)
Theoretical Computer Science
, vol.290
, Issue.1
, pp. 695-740
-
-
Amadio, R.M.1
Lugiez, D.2
Vanackere, V.3
-
4
-
-
0001940580
-
Provably secure session key distribution: The three party case
-
ACM
-
M. Bellare and P. Rogaway. Provably secure session key distribution: the three party case. In STOC'95, pages 57-66. ACM, 1995.
-
(1995)
STOC'95
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
Springer
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In ICALP 2001, pages 667-681. Springer, 2001.
-
(2001)
ICALP 2001
, pp. 667-681
-
-
Boreale, M.1
-
9
-
-
18544387122
-
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In FSTTCS 2003.
-
(2003)
FSTTCS
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
11
-
-
0004060205
-
-
Available from
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree Automata Techniques and Applications, 1997. Available from http://www.grappa.univ-lille3.fr/tata.
-
(1997)
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Lugiez, D.5
Tison, S.6
Tommasi, M.7
-
12
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In LICS 2003.
-
(2003)
LICS
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
14
-
-
0005240447
-
A Cryptographic Evaluation of IPsec
-
Available from
-
N. Ferguson and B. Schneier. A Cryptographic Evaluation of IPsec. Technical report, 2000. Available from http://www.counterpane.com/ipsec.pdf.
-
(2000)
Technical Report
-
-
Ferguson, N.1
Schneier, B.2
-
15
-
-
84874721799
-
On the decidability of cryptographic protocols with open-ended data structures
-
CONCUR SOUS, Springer
-
R. Küsters. On the decidability of cryptographic protocols with open-ended data structures. In CONCUR SOUS, LNCS 2421, pages 515-530. Springer, 2002.
-
(2002)
LNCS
, vol.2421
, pp. 515-530
-
-
Küsters, R.1
-
16
-
-
27344454831
-
Automata-based Analysis of Recursive Cryptographic Protocols
-
CAU Kiel, Available from
-
R. Küsters and Th. Wilke. Automata-based Analysis of Recursive Cryptographic Protocols. Technical Report IFI 0311, CAU Kiel, 2003. Available from http://www.informatik.uni-kiel.de/reports/2003/0311.html
-
(2003)
Technical Report IFI 0311
-
-
Küsters, R.1
Wilke, Th.2
-
17
-
-
35048888529
-
Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives
-
C. Meadows. Extending formal cryptographic protocol analysis techniques for group protocols and low-level cryptographic primitives. In WITS 2000.
-
(2000)
WITS
-
-
Meadows, C.1
-
18
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Computer Society Press
-
C. Meadows. Open issues in formal methods for cryptographic protocol analysis. In DISCEX 2000, pages 237-250. IEEE Computer Society Press, 2000.
-
(2000)
DISCEX
, vol.2000
, pp. 237-250
-
-
Meadows, C.1
-
19
-
-
0035751921
-
Constraint solving for bounded-process cryptographic protocol analysis
-
ACM Press
-
J. K. Millen and V. Shmatikov. Constraint solving for bounded-process cryptographic protocol analysis. In CCS 2001, pages 166-175. ACM Press, 2001.
-
(2001)
CCS
, vol.2001
, pp. 166-175
-
-
Millen, J.K.1
Shmatikov, V.2
-
20
-
-
84974693396
-
Towards regular languages over infinite alphabets
-
MFCS 2001, Springer
-
F. Neven, Th. Schwentick, and V. Vianu. Towards regular languages over infinite alphabets. In MFCS 2001, LNCS 2136, pages 560-572. Springer, 2001.
-
(2001)
LNCS
, vol.2136
, pp. 560-572
-
-
Neven, F.1
Schwentick, Th.2
Vianu, V.3
-
21
-
-
0030696539
-
Mechanized Proofs for a Recursive Authentication Protocol
-
IEEE Computer Society Press
-
L.C. Paulson. Mechanized Proofs for a Recursive Authentication Protocol. In CSFW-10, pages 84-95. IEEE Computer Society Press, 1997.
-
(1997)
CSFW-10
, pp. 84-95
-
-
Paulson, L.C.1
-
22
-
-
0034822650
-
A Security Analysis of the Cliques Protocols Suites
-
IEEE Computer Society Press
-
O. Pereira and J.-J. Quisquater. A Security Analysis of the Cliques Protocols Suites. In CSFW-14, pages 73-81. IEEE Computer Society Press, 2001.
-
(2001)
CSFW-14
, pp. 73-81
-
-
Pereira, O.1
Quisquater, J.-J.2
-
23
-
-
0034822801
-
Protocol Insecurity with Finite Number of Sessions is NP-complete
-
M. Rusinowitch and M. Turuani. Protocol Insecurity with Finite Number of Sessions is NP-complete. In CSFW-14, pages 174-190. 2001.
-
(2001)
CSFW-14
, pp. 174-190
-
-
Rusinowitch, M.1
Turuani, M.2
-
24
-
-
0028523063
-
Haskell overloading is DEXPTIME-complete
-
H. Seidl. Haskell overloading is DEXPTIME-complete. Information Processing Letters, 52(2), 1994.
-
(1994)
Information Processing Letters
, vol.52
, Issue.2
-
-
Seidl, H.1
-
25
-
-
0032669524
-
Fixing a security flaw in IKE protocols
-
J. Zhou. Fixing a security flaw in IKE protocols. Electronic Letter, 35(13):10721073, 1999.
-
(1999)
Electronic Letter
, vol.35
, Issue.13
, pp. 10721073
-
-
Zhou, J.1
|