-
1
-
-
84874678490
-
On name generation and set-based analysis in the Dolev-Yao model
-
Proc. CONCUR '02
-
R. Amadio and W. Charatonik. On name generation and set-based analysis in the Dolev-Yao model. In Proc. CONCUR '02, volume 2421 of LNCS, pages 499-514, 2002.
-
(2002)
LNCS
, vol.2421
, pp. 499-514
-
-
Amadio, R.1
Charatonik, W.2
-
4
-
-
4944261697
-
Tree automata with one memory, set constraints and cryptographic protocols
-
To appear
-
H. Comon and V. Cortier. Tree automata with one memory, set constraints and cryptographic protocols. Theoretical Comput. Sci., 2003. To appear.
-
(2003)
Theoretical Comput. Sci.
-
-
Comon, H.1
Cortier, V.2
-
6
-
-
0000029077
-
Rewrite systems
-
J. van Leeuwen, editor, Formal Models and Semantics, chapter 6, Elsevier Science Publishers and The MIT Press
-
N. Dershowitz and J.-P. Jouannaud. Rewrite systems. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B - Formal Models and Semantics, chapter 6, pages 243-320. Elsevier Science Publishers and The MIT Press, 1990.
-
(1990)
Handbook of Theoretical Computer Science
, vol.B
, pp. 243-320
-
-
Dershowitz, N.1
Jouannaud, J.-P.2
-
8
-
-
0042500424
-
Undecidability of bounded security protocols
-
Trento, Italy
-
N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Undecidability of bounded security protocols. In Proc. Workshop on formal methods in security protocols, Trento, Italy, 1999.
-
(1999)
Proc. Workshop on Formal Methods in Security Protocols
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
10
-
-
35248870210
-
On the faithfulness of formal models. in Mathematical Foundations of Computer Science
-
Springer-Verlag
-
Z. Manna and A. Pnueli. On the faithfulness of formal models. In Mathematical Foundations of Computer Science, volume 520 of Lecture Notes in Computer Science, pages 28-42. Springer-Verlag, 1991.
-
(1991)
Lecture Notes in Computer Science
, vol.520
, pp. 28-42
-
-
Manna, Z.1
Pnueli, A.2
-
11
-
-
0027578148
-
Automatic recognition of tractability in inference relations
-
D. McAllester. Automatic recognition of tractability in inference relations. Journal of the ACM, 40(2):284-303, 1993.
-
(1993)
Journal of the ACM
, vol.40
, Issue.2
, pp. 284-303
-
-
McAllester, D.1
-
12
-
-
0037453396
-
Protocol insecurity with finite number of sessions, composed keys is NP-complete
-
M. Rusinowitch and M. Turuani. Protocol insecurity with finite number of sessions, composed keys is NP-complete. Theoretical Comput. Sci., 299(1-3):451-475, 2003.
-
(2003)
Theoretical Comput. Sci.
, vol.299
, Issue.1-3
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
-
13
-
-
0028532997
-
Cryptoanalysis and protocol failure
-
Nov.
-
G. J. Simmons. Cryptoanalysis and protocol failure. Commun. ACM, 37(11):56-65, Nov. 1994.
-
(1994)
Commun. ACM
, vol.37
, Issue.11
, pp. 56-65
-
-
Simmons, G.J.1
-
15
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
G. Brassard, editor, CRYPTO'89, Springer-Verlag
-
M. Tatebayashi, N. Matsuzaki, and D. B. Newmann. Key distribution protocol for digital mobile communication systems. In G. Brassard, editor, CRYPTO'89, volume 435 of Lecture Notes in Computer Science, pages 324-334. Springer-Verlag, 1989.
-
(1989)
Lecture Notes in Computer Science
, vol.435
, pp. 324-334
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newmann, D.B.3
|