-
2
-
-
35248865266
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
J. Radhakrishnan and P. Pandya, editors, Lecture Notes in Computer Science
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. In J. Radhakrishnan and P. Pandya, editors, Proc. FST/TCS, Mumbai, volume 2914 of Lecture Notes in Computer Science, 2003.
-
(2003)
Proc. FST/TCS, Mumbai
, vol.2914
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
3
-
-
1442292323
-
Tree automata with one memory, set constraints and cryptographic protocols
-
To appear. Also available as LSV research report LSV-01-13
-
H. Comon and V. Cortier. Tree automata with one memory, set constraints and cryptographic protocols. Theoretical Comput. Sci., 2004. To appear. Also available as LSV research report LSV-01-13.
-
Theoretical Comput. Sci.
, vol.2004
-
-
Comon, H.1
Cortier, V.2
-
5
-
-
33645800164
-
-
Lab. Specification and Verification, ENS de Cachan, Cachan, Prance
-
S. Delaune and F. Jacquemard. A theory of guessing attacks and its complexity. Research Report LSV-04-1, Lab. Specification and Verification, ENS de Cachan, Cachan, Prance, 2004.
-
(2004)
A Theory of Guessing Attacks and Its Complexity. Research Report LSV-04-1
-
-
Delaune, S.1
Jacquemard, F.2
-
6
-
-
0042500424
-
Undecidability of bounded security protocols
-
Trento, Italy
-
N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Undecidability of bounded security protocols. In Proc. Workshop on formal methods in security protocols, Trento, Italy, 1999.
-
(1999)
Proc. Workshop on Formal Methods in Security Protocols
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
7
-
-
20444464381
-
Abstraction and resolution modulo AC: How to verify diffie-hellman-like protocols automatically
-
Submitted to the special issue on processes and security
-
J. Goubault-Larrecq, M. Roger, and K. N. Verma. Abstraction and resolution modulo AC: How to verify diffie-hellman-like protocols automatically. Journal of Logic and Algebraic Programming, 2004. Submitted to the special issue on processes and security, 40 pages.
-
Journal of Logic and Algebraic Programming
, vol.2004
, pp. 40
-
-
Goubault-Larrecq, J.1
Roger, M.2
Verma, K.N.3
|