-
1
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
LNCS
-
R. M. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In International Conference on Concurrency Theory, volume 1877 of LNCS, pages 380-394, 2000.
-
(2000)
International Conference on Concurrency Theory
, vol.1877
, pp. 380-394
-
-
Amadio, R.M.1
Lugiez, D.2
-
2
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Andrew D. Gordon, editor, LNCS, Springer
-
B. Blanchet and A. Podelski. Verification of cryptographic protocols: Tagging enforces termination. In Andrew D. Gordon, editor, FoSSaCS'03: Foundations of Software Science and Computation Structures, volume 2620 of LNCS, pages 136152. Springer, 2003.
-
(2003)
FoSSaCS'03: Foundations of Software Science and Computation Structures
, vol.2620
, pp. 136152
-
-
Blanchet, B.1
Podelski, A.2
-
4
-
-
35048855590
-
Abstract interpretation for secrecy using patterns
-
LNCS
-
L. Bozga, Y. Lakhnech, and M. Périn. Abstract interpretation for secrecy using patterns. In TACAS'03, volume 2619 of LNCS, 2003.
-
(2003)
TACAS'03
, vol.2619
-
-
Bozga, L.1
Lakhnech, Y.2
Périn, M.3
-
5
-
-
0025386404
-
A logic of authentication
-
February
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(l):18-36, February 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.50
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
8
-
-
84947780217
-
New decidability results for fragments of firstorder logic and application to cryptographic protocols
-
LNCS
-
H. Comon-Lundh and V. Cortier. New decidability results for fragments of firstorder logic and application to cryptographic protocols. In 14th Int. Conf. Rewriting Techniques and Applications (RTA'2003), volume 2706 of LNCS, 2003.
-
(2003)
14th Int. Conf. Rewriting Techniques and Applications (RTA'2003)
, vol.2706
-
-
Comon-Lundh, H.1
Cortier, V.2
-
12
-
-
0034829105
-
Computing symbolic models for verifying cryptographic protocols
-
Washington - Brussels - Tokyo, June IEEE.
-
M. Fiore and M. Abadi. Computing symbolic models for verifying cryptographic protocols. In 14th IEEE Computer Security Foundations Workshop (CSFW '01), pages 160-173, Washington - Brussels - Tokyo, June 2001. IEEE.
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW '01)
, pp. 160-173
-
-
Fiore, M.1
Abadi, M.2
-
13
-
-
0002692684
-
Solving equations in abstract algebras: A rulebased survey of unification
-
Jean-Louis Lassez and Gordon Plotkin, editors, MIT-Press
-
J.-P. Jouannaud and C. Kirchner. Solving equations in abstract algebras: A rulebased survey of unification. In Jean-Louis Lassez and Gordon Plotkin, editors, Computational Logic: Essays in Honor of Alan Robinson. MIT-Press, 1991.
-
(1991)
Computational Logic: Essays in Honor of Alan Robinson.
-
-
Jouannaud, J.-P.1
Kirchner, C.2
-
14
-
-
0030708255
-
A hierarchy of authentication specifications
-
Washington - Brussels - Tokyo, June IEEE
-
G. Lowe. A hierarchy of authentication specifications. In 10th IEEE Computer Security Foundations Workshop (CSFW '97), pages 31-44, Washington - Brussels - Tokyo, June 1997. IEEE.
-
(1997)
10th IEEE Computer Security Foundations Workshop (CSFW '97)
, pp. 31-44
-
-
Lowe, G.1
-
15
-
-
0037250964
-
Formal methods for cryptographic protocol analysis: Emerging issues and trends
-
January
-
C. Meadows. Formal methods for cryptographic protocol analysis: Emerging issues and trends. IEEE Journal on Selected Areas in Communication, 21(l):44-54, January 2003.
-
(2003)
IEEE Journal on Selected Areas in Communication
, vol.21
, Issue.50
, pp. 44-54
-
-
Meadows, C.1
-
17
-
-
0029713842
-
Intensional specification of security protocols
-
Washington Brussels - Tokyo, June IEEE
-
A. W. Roscoe. Intensional specification of security protocols. In 9th IEEE Computer Security Foundations Workshop (CSFW '96), pages 28-38, Washington Brussels - Tokyo, June 1996. IEEE.
-
(1996)
9th IEEE Computer Security Foundations Workshop (CSFW '96)
, pp. 28-38
-
-
Roscoe, A.W.1
-
19
-
-
0030684956
-
Verifying authentication protocols with CSP
-
Washington - Brussels Tokyo, June IEEE
-
S. Schneider. Verifying authentication protocols with CSP. In 10th IEEE Computer Security Foundations Workshop (CSFW '97), pages 3-17, Washington - Brussels Tokyo, June 1997. IEEE.
-
(1997)
10th IEEE Computer Security Foundations Workshop (CSFW '97)
, pp. 3-17
-
-
Schneider, S.1
-
21
-
-
0026630927
-
Authentication for distributed systems
-
January
-
Thomas Y. C. Woo and Simon S. Lam. Authentication for distributed systems. Computer, 25(l):39-52, January 1992.
-
(1992)
Computer
, vol.25
, Issue.50
, pp. 39-52
-
-
Woo, T.Y.C.1
Lam, S.S.2
|