-
1
-
-
35248865266
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
FSTTCS'03, Springer-Verlag
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. In FSTTCS'03, pages 124-135. Springer-Verlag LNCS 2914, 2003.
-
(2003)
LNCS
, vol.2914
, pp. 124-135
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
2
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP decision procedure for protocol insecurity with XOR. In LICS'03, pages 261-270, 2003.
-
(2003)
LICS'03
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
3
-
-
1442292323
-
Tree automata with one memory, set constraints and cryptographic protocols
-
To appear
-
H. Comon and V. Cortier. Tree automata with one memory, set constraints and cryptographic protocols. Theoretical Computer Science, 2004. To appear.
-
(2004)
Theoretical Computer Science
-
-
Comon, H.1
Cortier, V.2
-
4
-
-
0004060205
-
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree automata techniques and applications. http://www.grappa.univ-lille3.fr/tata, 1997.
-
(1997)
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Lugiez, D.5
Tison, S.6
Tommasi, M.7
-
5
-
-
84947780217
-
New decidability results for fragments of first-order logic and application to cryptographic protocols
-
RTA'03, Springer-Verlag
-
H. Comon-Lundh and V. Cortier. New decidability results for fragments of first-order logic and application to cryptographic protocols. In RTA'03, pages 148-164. Springer-Verlag LNCS 2706, 2003.
-
(2003)
LNCS
, vol.2706
, pp. 148-164
-
-
Comon-Lundh, H.1
Cortier, V.2
-
7
-
-
0003002778
-
Tree languages
-
G. Rozenberg and A. Salomaa, editors, chapter 1, Springer-Verlag
-
F. Gécseg and M. Steinby. Tree languages. In G. Rozenberg and A. Salomaa, editors, Handbook of Formal Languages, volume 3, chapter 1, pages 1-68. Springer-Verlag, 1997.
-
(1997)
Handbook of Formal Languages
, vol.3
, pp. 1-68
-
-
Gécseg, F.1
Steinby, M.2
-
8
-
-
84876354671
-
A method for automatic cryptographic protocol verification
-
FMPPTA'00, Springer-Verlag
-
J. Goubault-Larrecq. A method for automatic cryptographic protocol verification. In FMPPTA'00, pages 977-984. Springer-Verlag LNCS 1800, 2000.
-
(2000)
LNCS
, vol.1800
, pp. 977-984
-
-
Goubault-Larrecq, J.1
-
9
-
-
20144382303
-
Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve?
-
V. Ménissier-Morain, editor, INRIA, collection didactique
-
J. Goubault-Larrecq. Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve? In V. Ménissier-Morain, editor, Actes des 12èmes Journées Francophones des Langages Applicatifs (JFLA'04). INRIA, collection didactique, 2004.
-
(2004)
Actes des 12èmes Journées Francophones des Langages Applicatifs (JFLA'04)
-
-
Goubault-Larrecq, J.1
-
10
-
-
20444464381
-
Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically
-
To Appear. Available as Research Report LS V-04-7, LSV, ENS Cachan
-
J. Goubault-Larrecq, M. Roger, and K. N. Verma. Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically. Journal of Logic and Algebraic Programming, 2004. To Appear. Available as Research Report LS V-04-7, LSV, ENS Cachan.
-
(2004)
Journal of Logic and Algebraic Programming
-
-
Goubault-Larrecq, J.1
Roger, M.2
Verma, K.N.3
-
11
-
-
0000769632
-
On the reachability problem for 5-dimensional vector addition systems
-
J. Hopcroft and J. J. Pansiot. On the reachability problem for 5-dimensional vector addition systems. Theoretical Computer Science, 8:135-159, 1979.
-
(1979)
Theoretical Computer Science
, vol.8
, pp. 135-159
-
-
Hopcroft, J.1
Pansiot, J.J.2
-
13
-
-
35248882451
-
Counting and equality constraints for multitree automata
-
FOSSACS'03, Springer-Verlag
-
D. Lugiez. Counting and equality constraints for multitree automata. In FOSSACS'03, pages 328-342. Springer-Verlag LNCS 2620, 2003.
-
(2003)
LNCS
, vol.2620
, pp. 328-342
-
-
Lugiez, D.1
-
14
-
-
84957716708
-
Abstracting cryptographic protocols with tree automata
-
SAS'99, Springer-Verlag
-
D. Monniaux. Abstracting cryptographic protocols with tree automata. In SAS'99, pages 149-163. Springer-Verlag LNCS 1694, 1999.
-
(1999)
LNCS
, vol.1694
, pp. 149-163
-
-
Monniaux, D.1
-
15
-
-
84944240660
-
Beyond regularity: Equational tree automata for associative and commutative theories
-
CSL'01, Springer-Verlag
-
H. Ohsaki. Beyond regularity: Equational tree automata for associative and commutative theories. In CSL'01, pages 539-553. Springer-Verlag LNCS 2142, 2001.
-
(2001)
LNCS
, vol.2142
, pp. 539-553
-
-
Ohsaki, H.1
-
16
-
-
0030696539
-
Mechanized proofs for a recursive authentication protocol
-
IEEE Computer Society Press
-
L. C. Paulson. Mechanized proofs for a recursive authentication protocol. In CSFW'97, pages 84-95. IEEE Computer Society Press, 1997.
-
(1997)
CSFW'97
, pp. 84-95
-
-
Paulson, L.C.1
-
17
-
-
0002219322
-
An attack on a recursive authentication protocol: A cautionary tale
-
P. Ryan and S. Schneider. An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters, 65(1):7-10, 1998.
-
(1998)
Information Processing Letters
, vol.65
, Issue.1
, pp. 7-10
-
-
Ryan, P.1
Schneider, S.2
-
19
-
-
0034247455
-
Key agreement in dynamic peer groups
-
M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems, 11 (8):769-780, 2000.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
21
-
-
9444253566
-
On closure under complementation of equational tree automata for theories extending AC
-
LPAR'03, Springer-Verlag
-
K. N. Verma. On closure under complementation of equational tree automata for theories extending AC. In LPAR'03, pages 183-197. Springer-Verlag LNCS 2850, 2003.
-
(2003)
LNCS
, vol.2850
, pp. 183-197
-
-
Verma, K.N.1
-
22
-
-
84947774804
-
Two-way equational tree automata for AC-like theories: Decidability and closure properties
-
RTA'03, Springer-Verlag
-
K. N. Verma. Two-way equational tree automata for AC-like theories: Decidability and closure properties. In RTA'03, pages 180-196. Springer-Verlag LNCS 2706, 2003.
-
(2003)
LNCS
, vol.2706
, pp. 180-196
-
-
Verma, K.N.1
-
23
-
-
4544348010
-
-
Research Report LSV-04-3, LSV, ENS Cachan, France, January
-
K. N. Verma and J. Goubault-Larrecq. Karp-Miller trees for a branching extension of VASS. Research Report LSV-04-3, LSV, ENS Cachan, France, January 2004.
-
(2004)
Karp-Miller Trees for a Branching Extension of VASS
-
-
Verma, K.N.1
Goubault-Larrecq, J.2
|