-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
Abadi M. (1999). Secrecy by typing in security protocols. J. ACM 46(5): 749-786
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
0005801960
-
Some doubly exponential sequences
-
Aho A.V. and Sloane N.J.A. (1973). Some doubly exponential sequences. Fibonacci Q. 11: 429-437
-
(1973)
Fibonacci Q.
, vol.11
, pp. 429-437
-
-
Aho, A.V.1
Sloane, N.J.A.2
-
3
-
-
85006614284
-
Verifying security protocols as planning in logic programming
-
Aiello L.C. and Massacci F. (2001). Verifying security protocols as planning in logic programming. ACM Trans. Comput. Logic 2(4): 542-580
-
(2001)
ACM Trans. Comput. Logic
, vol.2
, Issue.4
, pp. 542-580
-
-
Aiello, L.C.1
Massacci, F.2
-
4
-
-
28144458017
-
Reconstruction of attacks against cryptographic protocols
-
In: 20-22 June 2005, Aix- en-Provence, France
-
Allamigeon, X., Blanchet, B.: Reconstruction of attacks against cryptographic protocols. In: 18th IEEE Computer Security Foundations Workshop (CSFW-18 2005), 20-22 June 2005, Aix- en-Provence, France, pp. 140-154 (2005)
-
(2005)
18th IEEE Computer Security Foundations Workshop (CSFW-18 2005)
, pp. 140-154
-
-
Allamigeon, X.1
Blanchet, B.2
-
5
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heam, P., Kouchnarenko, O., Mantovani, J., Moedersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA tool for the automated validation of internet security protocols and applications. In: Proceedings of the 17th International Conference on Computer-Aided Verification (CAV'05) (2005)
-
(2005)
Proceedings of the 17th International Conference on Computer-Aided Verification (CAV'05)
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Heam, P.8
Kouchnarenko, O.9
Mantovani, J.10
Moedersheim, S.11
von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
6
-
-
84937567009
-
The AVISS security protocol analysis tool
-
In: Springer (2002). URL of the AVISS and AVISPA projects:
-
Armando, A., Basin, D., Bouallagui, M., Chevalier, Y., Compagna, L., Mödersheim, S., Rusinowitch, M., Turuani, M., Viganò, L., Vigneron, L.: The AVISS security protocol analysis tool. In: Proceedings of CAV'02, LNCS, vol. 2404, pp. 349-354. Springer (2002). URL of the AVISS and AVISPA projects: http://www.avispa-project.org
-
Proceedings of CAV'02, LNCS
, vol.2404
, pp. 349-354
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Mödersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Viganò, L.9
Vigneron, L.10
-
7
-
-
84954313527
-
Automatic SAT-compilation of protocol insecurity problems via reduction to planning
-
In: Springer
-
Armando, A., Compagna, L.: Automatic SAT-compilation of protocol insecurity problems via reduction to planning. In: Proceedings of FORTE 2002, LNCS, vol. 2529, pp. 210-225. Springer (2002)
-
(2002)
Proceedings of FORTE 2002, LNCS
, vol.2529
, pp. 210-225
-
-
Armando, A.1
Compagna, L.2
-
8
-
-
35048841165
-
Abstraction-driven SAT-based analysis of security protocols
-
In: Giunchiglia, E., Tacchella, A. (eds.) Springer Selected Revised Papers. Presented to SAT 2003, S. Margherita Ligure, Italy. Available at
-
Armando, A., Compagna, L.: Abstraction-driven SAT-based analysis of security protocols. In: Giunchiglia, E., Tacchella, A. (eds.) Theory and Applications of Satisfiability Testing, LNCS, vol. 2919, pp. 257-271. Springer (2004). Selected Revised Papers. Presented to SAT 2003, S. Margherita Ligure, Italy. Available at http://www.avispa-project.org
-
(2004)
Theory and Applications of Satisfiability Testing, LNCS
, vol.2919
, pp. 257-271
-
-
Armando, A.1
Compagna, L.2
-
9
-
-
22944445210
-
SATMC: A SAT-based model checker for security protocols
-
Springer, Lisbon In:
-
AAmando, A., Compagna, L.: SATMC: a SAT-based model checker for security protocols. In: Proceedings of the 9th European Conference on Logics in Artificial Intelligence (JELIA 2004), LNAI, vol. 3229. Springer, Lisbon (2004)
-
(2004)
Proceedings of the 9th European Conference on Logics in Artificial Intelligence (JELIA 2004), LNAI
, vol.3229
-
-
Armando, A.1
Compagna, L.2
-
10
-
-
35248876774
-
SAT-based model- checking of security protocols using planning graph analysis
-
In: Springer
-
Armando, A., Compagna, L., Ganty, P.: SAT-based model- checking of security protocols using planning graph analysis. In: Proceedings of FME'2003, LNCS, vol. 2805. Springer (2003)
-
(2003)
Proceedings of FME'2003, LNCS
, vol.2805
-
-
Armando, A.1
Compagna, L.2
Ganty, P.3
-
11
-
-
22944484456
-
Automatic compilation of protocol insecurity problems into logic programming
-
In: Springer, Lisbon
-
Armando, A., Compagna, L., Lierler, Y.: Automatic compilation of protocol insecurity problems into logic programming. In: Proceedings of the 9th European Conference on Logics in Artificial Intelligence (JELIA 2004), LNAI, vol. 3229. Springer, Lisbon (2004)
-
(2004)
Proceedings of the 9th European Conference on Logics in Artificial Intelligence (JELIA 2004), LNAI
, vol.3229
-
-
Armando, A.1
Compagna, L.2
Lierler, Y.3
-
12
-
-
0142188052
-
An on-the-fly model-checker for security protocol analysis
-
In: Snekkenes, E., Gollmann, D. (eds.) Springer (2003). Available at
-
Basin, D., Mödersheim, S., Viganò, L.: An on-the-fly model-checker for security protocol analysis. In: Snekkenes, E., Gollmann, D. (eds.) Proceedings of ESORICS'03, LNCS, vol. 2808, pp. 253-270. Springer (2003). Available at http://www.avispa-project.org
-
Proceedings of ESORICS'03, LNCS
, vol.2808
, pp. 253-270
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
13
-
-
18744415053
-
Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols
-
In: Atluri, V., Liu, P. (eds.) ACM Press (2003). Available at
-
Basin, D., Mödersheim, S., Viganò, L.: Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols. In: Atluri, V., Liu, P. (eds.) Proceedings of CCS'03, pp. 335-344. ACM Press (2003). Available at http:// www.avispa-project.org
-
Proceedings of CCS'03
, pp. 335-344
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
15
-
-
84944319371
-
Symbolic model checking without BDDs
-
In: Cleaveland, W.R. (ed.) Springer
-
Biere, A., Cimatti, A., Clarke, E., Zhu, Y.: Symbolic model checking without BDDs. In: Cleaveland, W.R. (ed.) Proceedings of TACAS'99, LNCS, vol. 1579, pp. 193-207. Springer (1999)
-
(1999)
Proceedings of TACAS'99, LNCS
, vol.1579
, pp. 193-207
-
-
Biere, A.1
Cimatti, A.2
Clarke, E.3
Zhu, Y.4
-
16
-
-
13644264990
-
Verification of cryptographic protocols: Tagging enforces termination
-
(in press)
-
Blanchet, P.: Verification of cryptographic protocols: Tagging enforces termination. Theor. Comput. Sci. 333 (2005) (in press)
-
(2005)
Theor. Comput. Sci.
, vol.333
-
-
Blanchet, P.1
-
17
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
In: IEEE Computer Society Press
-
Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: Proceedings of CSFW'01, pp. 82-96. IEEE Computer Society Press (2001)
-
(2001)
Proceedings of CSFW'01
, pp. 82-96
-
-
Blanchet, B.1
-
18
-
-
1242332714
-
Automatic verification of cryptographic protocols: A logic programming approach (invited talk)
-
In: ACM Press
-
Blanchet, B.: Automatic verification of cryptAgraphic protocols: a logic programming approach (invited talk). In: Proceedings of PPDP'03, pp. 1-3. ACM Press (2003)
-
(2003)
Proceedings of PPDP'03
, pp. 1-3
-
-
Blanchet, B.1
-
19
-
-
3543058869
-
Automatic proof of strong secrecy for security protocols
-
In: IEEE Computer Society Press
-
Blanchet, B.: Automatic proof of strong secrecy for security protocols. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 86-100. IEEE Computer Society Press (2004)
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 86-100
-
-
Blanchet, B.1
-
21
-
-
18444375514
-
Control flow analysis can find new flaws too
-
In: URL
-
Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Nielson, H.R.: Control flow analysis can find new flaws too. In: Proceedings of Workshop on Issues in the Theory of Security (WITS 04) (2004). URL http://www2.imm.dtu.dk/pubdb/p.php?3058
-
(2004)
Proceedings of Workshop on Issues in the Theory of Security (WITS 04)
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Nielson, H.R.5
-
22
-
-
84942246406
-
Automatic validation of protocol narration
-
In: IEEE Computer Society Press
-
Bodei, C., Buchholtz, M., Degano, P., Nielson, F., Riis Nielson, H.: Automatic validation of protocol narration. In: Proceedings of CSFW'03, pp. 126-140. IEEE Computer Society Press (2003)
-
(2003)
Proceedings of CSFW'03
, pp. 126-140
-
-
Bodei, C.1
Buchholtz, M.2
Degano, P.3
Nielson, F.4
Riis Nielson, H.5
-
23
-
-
21144444143
-
Compositional analysis of authentication protocols
-
In: Schmidt, D.A. (ed.) Springer URL
-
Bugliesi, M., Focardi, R., Maffei, M.: Compositional analysis of authentication protocols. In: Schmidt, D.A. (ed.) ESOP, Lecture Notes in Computer Science, vol. 2986, pp. 140-154. Springer (2004). URL http:// springerlink.metapress.com/openurl.asp?genre=article&issn= 0302-9743&volume=2986&spage=140
-
(2004)
ESOP, Lecture Notes in Computer Science
, vol.2986
, pp. 140-154
-
-
Bugliesi, M.1
Focardi, R.2
Maffei, M.3
-
24
-
-
0032671775
-
A meta-notation for protocol analysis
-
In: URL
-
Cervesato, I., Durgin, N.A., Lincoln, P., Mitchell, J.C., Scedrov, A.: A meta-notation for protocol analysis. In: CSFW, pp. 55-69 (1999). URL http://citeseer.nj.nec.com/cervesato99metanotation.html
-
(1999)
CSFW
, pp. 55-69
-
-
Cervesato, I.1
Durgin, N.A.2
Lincoln, P.3
Mitchell, J.C.4
Scedrov, A.5
-
25
-
-
23144433992
-
A high level protocol specification language for industrial security-sensitive protocols
-
In
-
Chevalier, Y., Compagna, L., Cuellar, J., Hankes Drieslma, P., Mantovani, J., Mödersheim, S., Vigneron, L.: A high level protocol specification language for industrial security-sensitive protocols. In: Proceedings of SAPS'2004 (2004)
-
(2004)
Proceedings of SAPS'2004
-
-
Chevalier, Y.1
Compagna, L.2
Cuellar, J.3
Hankes Drieslma, P.4
Mantovani, J.5
Mödersheim, S.6
Vigneron, L.7
-
26
-
-
84937559950
-
Automated unbounded verification of security protocols
-
In: Brinksma, E., Larsen, K.G. (eds.) Springer
-
Chevalier, Y., Vigneron, L.: Automated unbounded verification of security protocols. In: Brinksma, E., Larsen, K.G. (eds.) Proceedings of CAV'02, LNCS, vol. 2404, pp. 324-337. Springer (2002)
-
(2002)
Proceedings of CAV'02, LNCS
, vol.2404
, pp. 324-337
-
-
Chevalier, Y.1
Vigneron, L.2
-
28
-
-
84863949796
-
Partial order reductions for security protocol verification
-
Clarke, E.M., Jha, S., Marrero, W.R.: Partial order reductions for security protocol verification. In: TACAS, pp. 503-518 (2000)
-
(2000)
TACAS
, pp. 503-518
-
-
Clarke, E.M.1
Jha, S.2
Marrero, W.R.3
-
29
-
-
38149033346
-
SAT-based model-checking of security protocols
-
Ph.D. thesis, Università degli Studi di Genova and the University of Edinburgh (joint programme)
-
Compagna, L.: SAT-based model-checking of security protocols. Ph.D. thesis, Università degli Studi di Genova and the University of Edinburgh (joint programme) (2005)
-
(2005)
-
-
Compagna, L.1
-
30
-
-
84958742278
-
An improved constraint-based system for the verification of security protocols
-
In: Springer
-
Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Proceedings of SAS 2002, LNCS, vol. 2477, pp. 326-341. Springer (2002)
-
(2002)
Proceedings of SAS 2002, LNCS
, vol.2477
, pp. 326-341
-
-
Corin, R.1
Etalle, S.2
-
31
-
-
0020720357
-
On the security of public-key protocols
-
(in press)
-
Dolev, D., Yao, A.: On the security of public-key protocols. IEEE Trans. Inf. Theory 2 (29) (1983) (in press)
-
(1983)
IEEE Trans. Inf. Theory
, vol.2
, Issue.29
-
-
Dolev, D.1
Yao, A.2
-
33
-
-
38149053414
-
CVS at work: A report on new failures upon some cryptographic protocols
-
In: Models and Architectures for Network Security, LNCS
-
Durante F., Gorrieri: CVS at work: a report on new failures upon some cryptographic protocols. In: MMMACNS: International Workshop on Methods, Models and Architectures for Network Security, LNCS (2001)
-
(2001)
MMMACNS: International Workshop on Methods
-
-
Durante, F.1
Gorrieri2
-
34
-
-
35048848765
-
-
Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Multiset rewriting and the complexity of bounded security protocols (2002)
-
(2002)
Multiset Rewriting and the Complexity of Bounded Security Protocols
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
35
-
-
84880695707
-
Automatic SAT- compilation of planning problems
-
In: Morgan Kaufmann
-
Ernst, M.D., Millstein, T.D., Weld, D.S.: Automatic SAT- compilation of planning problems. In: Proceedings of the 15th International Joint Conference on Artificial Intelligence (IJCAI-97), pp. 1169-1177. Morgan Kaufmann (1997)
-
(1997)
Proceedings of the 15th International Joint Conference on Artificial Intelligence (IJCAI-97)
, pp. 1169-1177
-
-
Ernst, M.D.1
Millstein, T.D.2
Weld, D.S.3
-
37
-
-
0031676397
-
Strand spaces: Why a security protocol is correct?
-
In: IEEE Computer Society Press, New York
-
FáWrega, F.J.T., Herzog, J.C., Guttman, J.D.: Strand spaces: why a security protocol is correct? In: Proceedings of the 1998 IEEE Symposium on Security and Privacy, pp. 160-171. IEEE Computer Society Press, New York (1998)
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
, pp. 160-171
-
-
Fábrega, F.J.T.1
Herzog, J.C.2
Guttman, J.D.3
-
38
-
-
1442267745
-
Secrecy in security protocols as non interference
-
URL
-
Focardi, R., Gorrieri, R., Martinelli, F.: Secrecy in security protocols as non interference. Electr. Notes Theor. Comput. Sci 32 (2000). URL http://www.elsevier.com/gej-ng/31/29/23/57/23/show/Products/notes/ index.htt#007
-
(2000)
Electr. Notes Theor. Comput. Sci
, vol.32
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
39
-
-
0003780657
-
-
The AIPS-98 Planning Competition Commitee
-
Ghallab, M., Howe, A., Knoblock, C., McDermott, D., Ram, A., Veloso, M., Weld, D., Wilkins, D.: The PDDL planning domain definition language (1998). The AIPS-98 Planning Competition Commitee
-
(1998)
The PDDL Planning Domain Definition Language
-
-
Ghallab, M.1
Howe, A.2
Knoblock, C.3
McDermott, D.4
Ram, A.5
Veloso, M.6
Weld, D.7
Wilkins, D.8
-
40
-
-
0038414953
-
Typing correspondence assertions for communication protocols
-
(in press)
-
Gordon, J.: Typing correspondence assertions for communication protocols. Theor. Comput. Sci. 300 (2003) (in press)
-
(2003)
Theor. Comput. Sci.
, vol.300
-
-
Gordon, J.1
-
41
-
-
0141863341
-
Authenticity by typing for security protocols
-
Gordon A.D. and Jeffrey A. (2003). Authenticity by typing for security protocols. J. Comput. Security 11(4): 451-520
-
(2003)
J. Comput. Security
, vol.11
, Issue.4
, pp. 451-520
-
-
Gordon, A.D.1
Jeffrey, A.2
-
42
-
-
23144437178
-
Using static analysis to validate the SAML single sign-on protocol
-
In: URL
-
Hansen, S.M., Skriver, J., Nielson, H.R.: Using static analysis to validate the SAML single sign-on protocol. In: WITS (2005). URL http:// www2.imm.dtu.dk/pubdb/p.php?3657
-
(2005)
WITS
-
-
Hansen, S.M.1
Skriver, J.2
Nielson, H.R.3
-
44
-
-
38149107981
-
Information technology - Security Techniques - Entity Authentication - Part 3: Mechanisms Using Digital Signature Techniques
-
ISO/IEC: ISO/IEC 9798-3:
-
ISO/IEC: ISO/IEC 9798-3: Information technology - Security techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques (1997)
-
(1997)
-
-
-
45
-
-
0001793083
-
Encoding plans in propositional logic
-
In: Aiello, L.C., Doyle, J., Shapiro S. (eds.) Morgan Kaufmann
-
Kautz, H., McAllester, H., Selman, B.: Encoding plans in propositional logic. In: Aiello, L.C., Doyle, J., Shapiro S. (eds.) KR'96: Principles of Knowledge Representation and Reasoning, pp. 374-384. Morgan Kaufmann (1996)
-
(1996)
KR'96: Principles of Knowledge Representation and Reasoning
, pp. 374-384
-
-
Kautz, H.1
McAllester, H.2
Selman, B.3
-
46
-
-
0002303187
-
Planning as satisfiability
-
Kautz, H.A., Selman, B.: Planning as satisfiability. In: ECAI, pp. 359-363 (1992)
-
(1992)
ECAI
, pp. 359-363
-
-
Kautz, H.A.1
Selman, B.2
-
47
-
-
0344243483
-
Answer set programming and plan generation
-
doi
-
Lifschitz, V.: Answer set programming and plan generation. Artif. Intell. 138 (1-2), 39-54 (2002). doi: http://dx.doi.org/10.1016/ S0004-3702(02)00186-8
-
(2002)
Artif. Intell.
, vol.138
, Issue.1-2
, pp. 39-54
-
-
Lifschitz, V.1
-
48
-
-
2942667864
-
ASSAT: Computing answer sets of a logic program by SAT solvers
-
Lin F. and Zhao Y. (2004). ASSAT: Computing answer sets of a logic program by SAT solvers. Artif. Intell. 157(1-2): 115-137
-
(2004)
Artif. Intell.
, vol.157
, Issue.1-2
, pp. 115-137
-
-
Lin, F.1
Zhao, Y.2
-
49
-
-
0342658605
-
Breaking and fixing the Needham-Shroeder Public-Key protocol using FDR
-
In: Margaria, T., Steffen, B. (eds.) Springer
-
Lowe, G.: Breaking and fixing the Needham-Shroeder Public-Key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) Proceedings of TACAS'96, LNCS, vol. 1055, pp. 147-166. Springer (1996)
-
(1996)
Proceedings of TACAS'96, LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
-
51
-
-
0031634547
-
Towards a completeness result for model checking of security protocols
-
In: IEEE Computer Society Press URL
-
Lowe, G.: Towards a completeness result for model checking of security protocols. In: Proceedings of CSFW'98. IEEE Computer Society Press (1998). URL http://citeseer.nj.nec.com/article/lowe98towards.html
-
(1998)
Proceedings of CSFW'98
-
-
Lowe, G.1
-
53
-
-
0037209815
-
Analysis of security protocols as open systems
-
Martinelli F. (2003). Analysis of security protocols as open systems. Theor. Comput Sci. 290(1): 1057-1106
-
(2003)
Theor. Comput Sci.
, vol.290
, Issue.1
, pp. 1057-1106
-
-
Martinelli, F.1
-
55
-
-
0030705405
-
Automated analysis of cryptographic protocols using murphi
-
Mitchell, J.C., Mitchell, M., Stern, U.: Automated analysis of cryptographic protocols using murphi. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 141-153 (1997)
-
(1997)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 141-153
-
-
Mitchell, J.C.1
Mitchell, M.2
Stern, U.3
-
56
-
-
0034852165
-
Chaff: Engineering an efficient SAT solver
-
In: URL
-
Moskewicz, M.W., Madigan, C.F., Zhao, Y., Zhang, L., Malik, S.: Chaff: engineering an efficient SAT solver. In: Proceedings of the 38th Design Automation Conference (DAC'01) (2001). URL http://www.ee.princeton.edu/ ~chaff/DAC2001v56.pdf
-
(2001)
Proceedings of the 38th Design Automation Conference (DAC'01)
-
-
Moskewicz, M.W.1
Madigan, C.F.2
Zhao, Y.3
Zhang, L.4
Malik, S.5
-
57
-
-
14044269417
-
Using encryption for authentication in large networks of computers
-
CSL-78-4, Xerox Palo Alto Research Center, Palo Alto Reprinted June 1982
-
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Tech. Rep. CSL-78-4, Xerox Palo Alto Research Center, Palo Alto (1978). Reprinted June 1982
-
(1978)
Tech. Rep.
-
-
Needham, R.M.1
Schroeder, M.D.2
-
58
-
-
0033260715
-
Logic programs with stable model semantics as a constraint programming paradigm
-
Niemelä I. (1999). Logic programs with stable model semantics as a constraint programming paradigm. Ann. Math. Artif. Intell. 25(3-4): 241-273
-
(1999)
Ann. Math. Artif. Intell
, vol.25
, Issue.3-4
, pp. 241-273
-
-
Niemelä, I.1
-
59
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L.C. (1998). The inductive approach to verifying cryptographic protocols. J. Comput. Security 6(1): 85-128
-
(1998)
J. Comput. Security
, vol.6
, Issue.1
, pp. 85-128
-
-
Paulson, L.C.1
-
60
-
-
38149116728
-
-
Submitted for journal publication. Eearlier version: Technical report 216, Albert-Ludwigs-Universität Freiburg, Institut fnr Informatik, 2005. Available at URL
-
Rintanen, J., Heljanko, K., Niemelä, I.: Planning as satisfiability: Parallel plans and algorithms for plan search (2005). Submitted for journal publication. Eearlier version: Technical report 216, Albert-Ludwigs-Universität Freiburg, Institut fnr Informatik, 2005. Available at URL http://www.informatik.uni-freiburg.de/~rintanen
-
(2005)
Planning As Satisfiability: Parallel Plans and Algorithms for Plan Search
-
-
Rintanen, J.1
Heljanko, K.2
Niemelä, I.3
-
62
-
-
0035072287
-
Athena: A novel approach to efficient automatic security protocol analysis
-
Song D., Berezin S. and Perrig A. (2001). Athena: A novel approach to efficient automatic security protocol analysis. J. Comput. Security 9: 47-74
-
(2001)
J. Comput. Security
, vol.9
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
64
-
-
13944268535
-
Sécurité des Protocoles Cryptographiques: Décidabilité et Complexité
-
Ph.D. thesis, Université Henri Poincaré, Nancy
-
Turuani, M.: Sécurité des Protocoles Cryptographiques: Décidabilité et Complexité. Ph.D. thesis, Université Henri Poincaré, Nancy (2003)
-
(2003)
-
-
Turuani, M.1
|