-
1
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1-2), 2-32 (2006)
-
(2006)
Theor. Comput. Sci
, vol.367
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
Amadio, R., Lugiez, D., Vanackère, V.: On the symbolic reduction of processes with cryptographic functions. Theor. Comput. Sci. 290(1), 695-740 (2003)
-
(2003)
Theor. Comput. Sci
, vol.290
, Issue.1
, pp. 695-740
-
-
Amadio, R.1
Lugiez, D.2
Vanackère, V.3
-
3
-
-
38049113781
-
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps (2007) http ://www.univ-orleans.fr/lifo/prodsci/rapports/RR/RR2007/ RR-2207-02.ps
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps (2007) http ://www.univ-orleans.fr/lifo/prodsci/rapports/RR/RR2007/ RR-2207-02.ps
-
-
-
-
4
-
-
22944445210
-
SATMC: A SAT-based Model Checker for Security Protocols
-
Alferes, J.J, Leite, J.A, eds, JELIA 2004, Springer, Heidelberg
-
Armando, A., Compagna, L.: SATMC: a SAT-based Model Checker for Security Protocols. In: Alferes, J.J., Leite, J.A. (eds.) JELIA 2004. LNCS (LNAI), vol. 3229, pp. 730-733. Springer, Heidelberg (2004)
-
(2004)
LNCS (LNAI
, vol.3229
, pp. 730-733
-
-
Armando, A.1
Compagna, L.2
-
6
-
-
0346024751
-
Monadic thue systems
-
Book, R.V., Jantzen, M., Wrathall, C.: Monadic thue systems. Theor. Comput. Sci. 19, 231-251 (1982)
-
(1982)
Theor. Comput. Sci
, vol.19
, pp. 231-251
-
-
Book, R.V.1
Jantzen, M.2
Wrathall, C.3
-
7
-
-
84936902338
-
-
Book, R.V., Otto, F.: The verifiability of two-party protocols. In: EUROCRYPT, pp. 254-260 (1985)
-
Book, R.V., Otto, F.: The verifiability of two-party protocols. In: EUROCRYPT, pp. 254-260 (1985)
-
-
-
-
8
-
-
84944686372
-
A Tool for Lazy Verification of Security Protocols
-
IEEE Computer Society Press, Washington, DC, USA
-
Chevalier, Y., Vigneron, L.: A Tool for Lazy Verification of Security Protocols. In: Proc. of the Automated Software Engineering Conference (ASE'01), IEEE Computer Society Press, Washington, DC, USA (2001)
-
(2001)
Proc. of the Automated Software Engineering Conference (ASE'01)
-
-
Chevalier, Y.1
Vigneron, L.2
-
9
-
-
24944569389
-
-
Comon-Lundh, H., Delaune, S.: The finite variant property: how to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, 3467, pp. 294-307. Springer, Heidelberg (2005)
-
Comon-Lundh, H., Delaune, S.: The finite variant property: how to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467, pp. 294-307. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
35248836596
-
Easy Intruder Deductions
-
Dershowitz, N, ed, Verification: Theory and Practice, Springer, Heidelberg
-
Comon-Lundh, H., Treinen, R.: Easy Intruder Deductions. In: Dershowitz, N. (ed.) Verification: Theory and Practice. LNCS, vol. 2772, pp. 225-242. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2772
, pp. 225-242
-
-
Comon-Lundh, H.1
Treinen, R.2
-
13
-
-
3042538605
-
Multiset rewriting and the complexity of bounded security protocols
-
Durgin, N.A., Lincoln, P.D., Mitchell, J.G., Scedrov, A.: Multiset rewriting and the complexity of bounded security protocols. Journal of Computer Security 12(1), 677-722 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 677-722
-
-
Durgin, N.A.1
Lincoln, P.D.2
Mitchell, J.G.3
Scedrov, A.4
-
14
-
-
84974751548
-
Regular tree languages and rewrite systems
-
Gilleron, R., Tison, S.: Regular tree languages and rewrite systems. Fundamenta Informaticae 24, 157-176 (1995)
-
(1995)
Fundamenta Informaticae
, vol.24
, pp. 157-176
-
-
Gilleron, R.1
Tison, S.2
-
15
-
-
84976811006
-
Confluent reductions: Abstract properties and applications to term rewriting systems
-
Huet, G.P.: Confluent reductions: Abstract properties and applications to term rewriting systems. Journal of the ACM 27(4), 797-821 (1980)
-
(1980)
Journal of the ACM
, vol.27
, Issue.4
, pp. 797-821
-
-
Huet, G.P.1
-
16
-
-
0031505860
-
On the unification problem for Cartesian Closed Categories
-
Narendran, P., Pfenning, F., Statman, R.: On the unification problem for Cartesian Closed Categories. Journal of Symbolic Logic 62(2), 636-647 (1997)
-
(1997)
Journal of Symbolic Logic
, vol.62
, Issue.2
, pp. 636-647
-
-
Narendran, P.1
Pfenning, F.2
Statman, R.3
-
17
-
-
23144457408
-
-
Nesi, M., Rucci, G.: Formalizing and analyzing the Needham-Schroeder symmetrickey protocol by rewriting. Electr. Notes Theor. Comput. Sci. 135(1), 95-114 (2005)
-
Nesi, M., Rucci, G.: Formalizing and analyzing the Needham-Schroeder symmetrickey protocol by rewriting. Electr. Notes Theor. Comput. Sci. 135(1), 95-114 (2005)
-
-
-
-
18
-
-
84957639842
-
Towards an automatic analysis of security protocols
-
Ganzinger, H, ed, Automated Deduction, CADE-16, Springer, Heidelberg
-
Weidenbach, C.: Towards an automatic analysis of security protocols. In: Ganzinger, H. (ed.) Automated Deduction - CADE-16. LNCS (LNAI), vol. 1632, pp. 378-382. Springer, Heidelberg (1999)
-
(1999)
LNCS (LNAI
, vol.1632
, pp. 378-382
-
-
Weidenbach, C.1
|