-
1
-
-
0035035153
-
Mobile Values, New Names, and Secure Communication
-
M. Abadi, C. Fournet. Mobile Values, New Names, and Secure Communication. In Conf. Rec. of POPL'01, 2001.
-
(2001)
Conf. Rec. of POPL'01
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Proc. of Concur'00, Springer-Verlag, Full version: RR 3915, INRIA Sophia Antipolis
-
R.M. Amadio, S. Lugiez. On the reachability problem in cryptographic protocols. In Proc. of Concur'00, LNCS 1877, Springer-Verlag, 2000. Full version: RR 3915, INRIA Sophia Antipolis.
-
(2000)
LNCS
, vol.1877
-
-
Amadio, R.M.1
Lugiez, S.2
-
3
-
-
84879529172
-
Symbolic Trace Analysis of Cryptographic Protocols
-
Proc. of ICALP'01, Springer-Verlag
-
M. Boreale. Symbolic Trace Analysis of Cryptographic Protocols. In Proc. of ICALP'01, LNCS 2076, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2076
-
-
Boreale, M.1
-
4
-
-
0036037230
-
Experimenting with STA, a Tool for Automatic Analysis of Security Protocols
-
ACM Press
-
M. Boreale, M. Buscemi. Experimenting with STA, a Tool for Automatic Analysis of Security Protocols. In Proc. of SAC'02, ACM Press, 2002.
-
(2002)
Proc. of SAC'02
-
-
Boreale, M.1
Buscemi, M.2
-
5
-
-
84874713281
-
A Framework for the Analysis of Security Protocol
-
Proc. of CONCUR '02, Springer-Verlag
-
M. Boreale and M. Buscemi. A Framework for the Analysis of Security Protocol. In Proc. of CONCUR '02, LNCS 2421. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2421
-
-
Boreale, M.1
Buscemi, M.2
-
6
-
-
33645585862
-
On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol
-
ENTS Series. Elsevier Science
-
M. Boreale and M. Buscemi. On the Symbolic Analysis of Low-Level Cryptographic Primitives: Modular Exponentiation and the Diffie-Hellman Protocol. To appear in Proc. of FCS'03, ENTS Series. Elsevier Science, 2003.
-
(2003)
Proc. of FCS'03
-
-
Boreale, M.1
Buscemi, M.2
-
8
-
-
35248897454
-
Tree automata with one memory, set constraints and ping-pong protocols
-
Proc. of ICALP'01, Springer-Verlag
-
H. Comon, V. Cortier, J. Mitchell. Tree automata with one memory, set constraints and ping-pong protocols. In Proc. of ICALP'01, LNCS 2076, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2076
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.3
-
9
-
-
9444264816
-
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or
-
IEEE Computer Society Press
-
H. Comon-Lundh and V. Shmatikov. Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or. In Proc. LICS '03, IEEE Computer Society Press, 2003.
-
(2003)
Proc. LICS '03
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
12
-
-
51149098006
-
An E-unification Algorithm for Analyzing Protocols that Use Modular Exponentiation
-
Proc. of RTA '03, Springer-Verlag
-
D. Kapur, P. Narendran, and L. Wang. An E-unification Algorithm for Analyzing Protocols that Use Modular Exponentiation. In Proc. of RTA '03, LNCS 2706, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2706
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
13
-
-
0342658605
-
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
-
Proc. of TACAS'96, Springer-Verlag
-
G. Lowe. Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. In Proc. of TACAS'96, LNCS 1055, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1055
-
-
Lowe, G.1
-
16
-
-
13544272458
-
The TRUST Protocol Analyser, Automatic and Efficient Verification of Cryptographic Protocols
-
V. Vanackère. The TRUST Protocol Analyser, Automatic and Efficient Verification of Cryptographic Protocols. In Proc. of Verify '02, 2002.
-
(2002)
Proc. of Verify '02
-
-
Vanackère, V.1
|