-
1
-
-
38049097683
-
-
J.A. Bull and D.J. Otway. The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
-
J.A. Bull and D.J. Otway. The authentication protocol. Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
-
-
-
-
2
-
-
0041967380
-
An NP Decision Procedure for Protocol Insecurity with XOR
-
IEEE, Computer Society Press
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. An NP Decision Procedure for Protocol Insecurity with XOR. In LICS 2003, pages 261-270. IEEE, Computer Society Press, 2003.
-
(2003)
LICS 2003
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
3
-
-
35248865266
-
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
-
FSTTCS 2003, of, Springer
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In FSTTCS 2003, volume 2914 of LNCS, pages 124-135. Springer, 2003.
-
(2003)
LNCS
, vol.2914
, pp. 124-135
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
4
-
-
14044254755
-
Deciding the Security of Protocols with Commuting Public Key Encryption
-
Y. Chevalier, R. Küsters, M. Rusinowitch, and M. Turuani. Deciding the Security of Protocols with Commuting Public Key Encryption. ENTCS, 125(1):55-66, 2005.
-
(2005)
ENTCS
, vol.125
, Issue.1
, pp. 55-66
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
5
-
-
84947780217
-
New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols
-
2706 of, Springer
-
H. Comon-Lundh and V. Cortier. New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols. In RTA 2003, volume 2706 of LNCS, pages 148-164. Springer, 2003.
-
(2003)
LNCS
, vol.RTA 2003
, pp. 148-164
-
-
Comon-Lundh, H.1
Cortier, V.2
-
6
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
IEEE, Computer Society Press
-
H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In LICS 2003, pages 271-280. IEEE, Computer Society Press, 2003.
-
(2003)
LICS 2003
, pp. 271-280
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
7
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
V. Cortier, S. Delaune, and P. Lafourcade. A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security, 14(1):1-43, 2006.
-
(2006)
Journal of Computer Security
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
8
-
-
14844295030
-
On the Decidability of Cryptographic Protocols with Open-ended Data Structures
-
R. Küsters. On the Decidability of Cryptographic Protocols with Open-ended Data Structures. International Journal of Information Security, 4(1-2):49-70, 2005.
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 49-70
-
-
Küsters, R.1
-
9
-
-
38049123154
-
On the Automatic Analysis of Recursive Security Protocols with XOR
-
Available from
-
R. Küsters and T. Truderung On the Automatic Analysis of Recursive Security Protocols with XOR. Technial Report, 2007. Available from http://people.inf.ethz.ch/kuestral/publications_html/KuestersTruderung-TR-STACS- 2007.pdf.
-
(2007)
Technial Report
-
-
Küsters, R.1
Truderung, T.2
-
10
-
-
35048832860
-
Automata-based Analysis of Recursive Cryptographic Protocols
-
STAGS 2004, of, Springer
-
R. Küsters and T. Wilke. Automata-based Analysis of Recursive Cryptographic Protocols. In STAGS 2004, volume 2996 of LNCS, pages 382-393. Springer, 2004.
-
(2004)
LNCS
, vol.2996
, pp. 382-393
-
-
Küsters, R.1
Wilke, T.2
-
11
-
-
0030696539
-
Mechanized Proofs for a Recursive Authentication Protocol
-
IEEE Computer Society Press
-
L.C. Paulson. Mechanized Proofs for a Recursive Authentication Protocol. In CSFW-10, pages 84-95. IEEE Computer Society Press, 1997.
-
(1997)
CSFW-10
, pp. 84-95
-
-
Paulson, L.C.1
-
12
-
-
0034822650
-
A Security Analysis of the Cliques Protocols Suites
-
IEEE Computer Society Press
-
O. Pereira and J.-J. Quisquater. A Security Analysis of the Cliques Protocols Suites. In CSFW-14, pages 73-81, IEEE Computer Society Press, 2001.
-
(2001)
CSFW-14
, pp. 73-81
-
-
Pereira, O.1
Quisquater, J.-J.2
-
14
-
-
35048827395
-
-
V. Shmatikov. Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. In (ESOP 2004), 2986 of LNCS, pages 355-369. Springer, 2004.
-
V. Shmatikov. Decidable Analysis of Cryptographic Protocols with Products and Modular Exponentiation. In (ESOP 2004), volume 2986 of LNCS, pages 355-369. Springer, 2004.
-
-
-
-
15
-
-
27344455431
-
Selecting theories and recursive protocols
-
CONCUR 2005, of, Springer
-
T. Truderung. Selecting theories and recursive protocols. In CONCUR 2005, volume 3653 of LNCS, pages 217-232. Springer, 2005.
-
(2005)
LNCS
, vol.3653
, pp. 217-232
-
-
Truderung, T.1
-
16
-
-
26944478183
-
On the complexity of equational horn clauses
-
CADE 2005, of, Springer
-
K.N. Verma, H. Seidl, and T. Schwentick. On the complexity of equational horn clauses. In CADE 2005, volume 3328 of LNCS, pages 337-352. Springer, 2005.
-
(2005)
LNCS
, vol.3328
, pp. 337-352
-
-
Verma, K.N.1
Seidl, H.2
Schwentick, T.3
|