-
1
-
-
4244001452
-
On the symbolic reduction of processes with cryptographic functions
-
March
-
Amadio, R.M., Lugiez, D. and Vanackèrc, V., "On the symbolic reduction of processes with cryptographic functions", INRIA Research Report 4147, March 2001.
-
(2001)
INRIA Research Report 4147
-
-
Amadio, R.M.1
Lugiez, D.2
Vanackèrc, V.3
-
2
-
-
35248878042
-
Verification of Cryptographic Protocols: Tagging Enforces Termination
-
Goedon, A.D. ed. Proc. FoSSaCS'03
-
Blanchet, B. and Podelski, P., "Verification of Cryptographic Protocols: Tagging Enforces Termination", In Goedon, A.D. ed. Proc. FoSSaCS'03, LNCS 2620, 2003, 136-152.
-
(2003)
LNCS
, vol.2620
, pp. 136-152
-
-
Blanchet, B.1
Podelski, P.2
-
3
-
-
84947780217
-
New decidability results for fragments of first-order logic and applications to cryptographic protocols
-
Nieuwenhuis, R. ed. Proc. RTA'2003
-
Comon-Lundh, H. and Cortier, V., "New decidability results for fragments of first-order logic and applications to cryptographic protocols", In Nieuwenhuis, R. ed. Proc. RTA'2003, LNCS 2706, 2003, 148-164.
-
(2003)
LNCS
, vol.2706
, pp. 148-164
-
-
Comon-Lundh, H.1
Cortier, V.2
-
4
-
-
35248897454
-
Tree automata with One Memory, Set Constraints, and Ping-Pong Protocols
-
Proc. ICALP 2001
-
Comon-Lundh, H., Cortier, V. and Mitchell, J.C., "Tree automata with One Memory, Set Constraints, and Ping-Pong Protocols", In Proc. ICALP 2001, LNCS 2076, 2001.
-
(2001)
LNCS
, vol.2076
-
-
Comon-Lundh, H.1
Cortier, V.2
Mitchell, J.C.3
-
6
-
-
0020190170
-
On the Security of Ping-Pong Protocols
-
Dolev, D., Even, S. and Karp, R.M., "On the Security of Ping-Pong Protocols", In Information and Control, 55, 1982, 57-68.
-
(1982)
Information and Control
, vol.55
, pp. 57-68
-
-
Dolev, D.1
Even, S.2
Karp, R.M.3
-
7
-
-
0011121265
-
The undecidability of bounded security protocols
-
Durgin, N.A., Lincoln, P.D., Mitchell, J.C. and Scedrov, A., "The undecidability of bounded security protocols", In Proc. FMSP'99, 1999.
-
(1999)
Proc. FMSP'99
-
-
Durgin, N.A.1
Lincoln, P.D.2
Mitchell, J.C.3
Scedrov, A.4
-
8
-
-
0033683193
-
How to Prevent Type Flaw Attacks on Security Protocols
-
Heather, J., Lowe, G. and Schneider, S. "How to Prevent Type Flaw Attacks on Security Protocols", In Proc. 13th IEEE CSFW, 2000, 255-268.
-
(2000)
Proc. 13th IEEE CSFW
, pp. 255-268
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
9
-
-
0001924088
-
A model for secure protocols and their composition
-
Heintze, N. and Tygar, D., "A model for secure protocols and their composition", In IEEE Transactions on Software Engineering, 22, 1996, 16-30.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, pp. 16-30
-
-
Heintze, N.1
Tygar, D.2
-
10
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Lowe, G., "Towards a completeness result for model checking of security protocols", In Journal of computer security, 7, 1999, 89-146.
-
(1999)
Journal of Computer Security
, vol.7
, pp. 89-146
-
-
Lowe, G.1
-
12
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson, L.C., "The inductive approach to verifying cryptographic protocols", In Journal of computer security, 6, 1998, 85-128.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 85-128
-
-
Paulson, L.C.1
-
13
-
-
11944263324
-
A decidable subclass of unbounded security protocols
-
Gorrieri, R. ed. April
-
Ramanujam, R. and Suresh, S.P., "A decidable subclass of unbounded security protocols", In Gorrieri, R. ed. Proc. WITS'03, April 2003, 11-20.
-
(2003)
Proc. WITS'03
, pp. 11-20
-
-
Ramanujam, R.1
Suresh, S.P.2
-
14
-
-
11944256048
-
An equivalence on terms for security protocols
-
Bharadwaj, R. ed. April
-
Ramanujam, R. and Suresh, S.P., "An equivalence on terms for security protocols", In Bharadwaj, R. ed. Proc. AVIS'03, April 2003, 45-56.
-
(2003)
Proc. AVIS'03
, pp. 45-56
-
-
Ramanujam, R.1
Suresh, S.P.2
-
16
-
-
0034822801
-
Protocol insecurity with finite number of sessions is NP-complete
-
Rusinowitch, M. and Turuani, M., "Protocol insecurity with finite number of sessions is NP-complete", In Proc. CSFW 14, 2001, 174-190.
-
(2001)
Proc. CSFW 14
, pp. 174-190
-
-
Rusinowitch, M.1
Turuani, M.2
|