-
1
-
-
35048821943
-
-
Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: Tulafale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, 3188, pp. 197-222. Springer, Heidelberg (2004)
-
Bhargavan, K., Fournet, C., Gordon, A.D., Pucella, R.: Tulafale: A security tool for web services. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2003. LNCS, vol. 3188, pp. 197-222. Springer, Heidelberg (2004)
-
-
-
-
2
-
-
0032671775
-
-
Cervesato, I., Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: A metanotation for protocol analysis. In: CSFW, pp. 55-69 (1999)
-
Cervesato, I., Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: A metanotation for protocol analysis. In: CSFW, pp. 55-69 (1999)
-
-
-
-
3
-
-
26444458330
-
Combining intruder theories
-
Caires, L, Italiano, C.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Chevalier, Y., Rusinowitch, M.: Combining intruder theories. In: Caires, L., Italiano, C.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 639-651. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 639-651
-
-
Chevalier, Y.1
Rusinowitch, M.2
-
4
-
-
33646262130
-
-
Basin, D.A., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, C., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), 3835, pp. 549-564. Springer, Heidelberg (2005)
-
Basin, D.A., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, C., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835, pp. 549-564. Springer, Heidelberg (2005)
-
-
-
-
5
-
-
24944569389
-
-
Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, 3467, Springer, Heidelberg (2005)
-
Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, Springer, Heidelberg (2005)
-
-
-
-
6
-
-
20144373910
-
Abstraction and resolution modulo ac: How to verify diffie-hellman-like protocols automatically
-
Goubault-Larrecq, J., Roger, M., Verma, K.N.: Abstraction and resolution modulo ac: How to verify diffie-hellman-like protocols automatically. J. Log. Algebr. Program. 64(2), 219-251 (2005)
-
(2005)
J. Log. Algebr. Program
, vol.64
, Issue.2
, pp. 219-251
-
-
Goubault-Larrecq, J.1
Roger, M.2
Verma, K.N.3
-
7
-
-
0030078047
-
Unification in the union of disjoint equational theories
-
Baader, F., Schulz, K.U.: Unification in the union of disjoint equational theories. J. Symb. Comput. 21(2), 211-243 (1996)
-
(1996)
J. Symb. Comput
, vol.21
, Issue.2
, pp. 211-243
-
-
Baader, F.1
Schulz, K.U.2
-
8
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
Thayer, F.J., Herzog, J.C., Guttman, J.D.: Strand spaces: Proving security protocols correct. Journal of Computer Security 7(1) (1999)
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Thayer, F.J.1
Herzog, J.C.2
Guttman, J.D.3
-
9
-
-
38049088737
-
Towards an Automatic Analysis of Web Service Security
-
Technical report, INRIA
-
Chevalier, Y., Lugiez, D., Rusinowitch, M.: Towards an Automatic Analysis of Web Service Security. Technical report, INRIA (2007), http://www.inria.fr/ rrrt/liste-2007.html
-
(2007)
-
-
Chevalier, Y.1
Lugiez, D.2
Rusinowitch, M.3
-
11
-
-
84957640213
-
-
Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), 1632, pp. 314-328. Springer, Heidelberg (1999)
-
Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), vol. 1632, pp. 314-328. Springer, Heidelberg (1999)
-
-
-
-
12
-
-
38049037747
-
-
Dershowitz, N., Jouannaud, J.P.: Rewrite systems. In: Handbook of Theoretical Computer Science, B, pp. 243-320. Elsevier, Amsterdam (1990)
-
Dershowitz, N., Jouannaud, J.P.: Rewrite systems. In: Handbook of Theoretical Computer Science, vol. B, pp. 243-320. Elsevier, Amsterdam (1990)
-
-
-
-
14
-
-
24144477933
-
-
analysis with an abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security
-
Milien, J., Shmatikov, V.: Symbolic protocol analysis with an abelian group operator or Diffie-Hellman exponentiation. Journal of Computer Security (2005)
-
(2005)
Symbolic protocol
-
-
Milien, J.1
Shmatikov, V.2
-
15
-
-
0041967380
-
Decision Procedure for Protocol Insecurity with XOR
-
Chevalier, Y., Kuesters, R., Rusinowitch, M., Turuani, M.:An NP Decision Procedure for Protocol Insecurity with XOR. In: Proceedings of the Logic In Computer Science Conference, LICS'03 (2003)
-
(2003)
Proceedings of the Logic In Computer Science Conference, LICS'03
-
-
Chevalier, Y.1
Kuesters, R.2
Rusinowitch, M.3
Turuani, M.4
An, N.P.5
-
16
-
-
38049086587
-
A symbolic intruder model for hash-collision attacks
-
11th Annual Asian Computing Science Conference, Springer, Heidelberg
-
Chevalier, Y., Kourjieh, M.: A symbolic intruder model for hash-collision attacks. In: 11th Annual Asian Computing Science Conference. LNCS, Springer, Heidelberg (2006) ftp://ftp.irit.fr/IRIT/LILAC/main.pdf
-
(2006)
LNCS
-
-
Chevalier, Y.1
Kourjieh, M.2
-
17
-
-
38049006849
-
Associative-commutative deducibility constraints
-
Thomas, W, Weil, P, eds, STACS 2007, Springer, Heidelberg
-
Bursuc, S., Comon-Lundh, H., Delaune, S.: Associative-commutative deducibility constraints. In: Thomas, W., Weil, P. (eds.) STACS 2007. LNCS, vol. 4393, pp. 634-645. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4393
, pp. 634-645
-
-
Bursuc, S.1
Comon-Lundh, H.2
Delaune, S.3
-
19
-
-
26444497860
-
-
Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
-
Armando, A., et al.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
-
-
-
|