-
1
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Springer-Verlag
-
R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In CONCUR '00, pages 380-394. Springer-Verlag, 2000.
-
(2000)
CONCUR '00
, pp. 380-394
-
-
Amadio, R.M.1
Lugiez, D.2
-
2
-
-
26944465513
-
Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions
-
Springer-Verlag
-
Y Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, and L. Vigneron. Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions. In CSL'03, pages 128-141. Springer-Verlag, 2003.
-
(2003)
CSL'03
, pp. 128-141
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
Vigneron, L.5
-
3
-
-
15744388991
-
Tree automata with one memory, set constraints and cryptographic protocols
-
H. Comon and V. Cortier. Tree automata with one memory, set constraints and cryptographic protocols. Theor. Comput. Sci., 331(1):143-214, 2005.
-
(2005)
Theor. Comput. Sci
, vol.331
, Issue.1
, pp. 143-214
-
-
Comon, H.1
Cortier, V.2
-
5
-
-
0020190170
-
On the security of pingpong protocols
-
S. Dolev, S. Even, and R. M. Karp. On the security of pingpong protocols. Inform. and Control, 55(1-3):57-68, 1982.
-
(1982)
Inform. and Control
, vol.55
, Issue.1-3
, pp. 57-68
-
-
Dolev, S.1
Even, S.2
Karp, R.M.3
-
6
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Multiset rewriting and the complexity of bounded security protocols. J. of Computer Security, 12(2):247-311, 2004.
-
(2004)
J. of Computer Security
, vol.12
, Issue.2
, pp. 247-311
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
9
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
G. Lowe. An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett., 56(3):131-133, 1995.
-
(1995)
Inf. Process. Lett
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
10
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Commun. ACM, 21(12):993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
11
-
-
0034822801
-
Protocol insecurity with finite number of sessions is NP-complete
-
IEEE Computer Society
-
M. Rusinowitch and M. Turuani. Protocol insecurity with finite number of sessions is NP-complete. In CSFW '01, pages 174-187. IEEE Computer Society, 2001.
-
(2001)
CSFW '01
, pp. 174-187
-
-
Rusinowitch, M.1
Turuani, M.2
-
12
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
IEEE Computer Society
-
D. X. Song. Athena: A new efficient automatic checker for security protocol analysis. In CSFW'99, pages 192-202. IEEE Computer Society, 1999.
-
(1999)
CSFW'99
, pp. 192-202
-
-
Song, D.X.1
|