-
1
-
-
38349077541
-
-
Arapinis, M., Duflot, M.: Bounding messages for free in security protocols (extended version) (2007), http://www.arapinis.org/publications/ fsttcs07ext.pdf
-
Arapinis, M., Duflot, M.: Bounding messages for free in security protocols (extended version) (2007), http://www.arapinis.org/publications/ fsttcs07ext.pdf
-
-
-
-
2
-
-
13644264990
-
Verification of cryptographic protocols: Tagging enforces termination. TCS
-
Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. TCS: Theoretical Computer Science 333 (2005)
-
(2005)
Theoretical Computer Science
, vol.333
-
-
Blanchet, B.1
Podelski, A.2
-
3
-
-
38349003859
-
-
Comon, H., Cortier, V.: Tree automata with one memory, set constraints and cryptographic protocols. Research Report LSV-01-13, Laboratoire Spécification et Vérification, ENS Cachan, France, p. 98 (2001)
-
Comon, H., Cortier, V.: Tree automata with one memory, set constraints and cryptographic protocols. Research Report LSV-01-13, Laboratoire Spécification et Vérification, ENS Cachan, France, p. 98 (2001)
-
-
-
-
4
-
-
38349000750
-
Safely composing security protocols
-
Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer, Heidelberg
-
Cortier, V., Delaître, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855, Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4855
-
-
Cortier, V.1
Delaître, J.2
Delaune, S.3
-
6
-
-
26944465513
-
-
Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M., Vigneron, L.: Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions. In: Baaz, M., Makowsky, J.A. (eds.) CSL 2003. LNCS, 2803, pp. 128-141. Springer, Heidelberg (2003)
-
Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M., Vigneron, L.: Extending the Dolev-Yao intruder for analyzing an unbounded number of sessions. In: Baaz, M., Makowsky, J.A. (eds.) CSL 2003. LNCS, vol. 2803, pp. 128-141. Springer, Heidelberg (2003)
-
-
-
-
7
-
-
38349046033
-
-
Cortier, V, Zalinescu, E, Deciding key cycles for security protocols. In
-
Cortier, V., Zalinescu, E.: Deciding key cycles for security protocols. In:
-
-
-
-
8
-
-
38349043013
-
-
Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS (LNAI), 4246, pp. 317-331. Springer, Heidelberg (2006)
-
Hermann, M., Voronkov, A. (eds.) LPAR 2006. LNCS (LNAI), vol. 4246, pp. 317-331. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
3042529055
-
Undecidability of bounded security protocols
-
Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Undecidability of bounded security protocols. In: Proc. Work. on Formal Methods and Security Protocols (FMSP) (1999)
-
(1999)
Proc. Work. on Formal Methods and Security Protocols (FMSP)
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
10
-
-
0037268614
-
How to prevent type flaw attacks on security protocols
-
Heather, J., Lowe, G., Schneider, S.: How to prevent type flaw attacks on security protocols. Journal of Computer Security 11(2), 217-244 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.2
, pp. 217-244
-
-
Heather, J.1
Lowe, G.2
Schneider, S.3
-
11
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of Computer Security 7(1) (1999)
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Lowe, G.1
-
12
-
-
38349072753
-
Preventing type flaw attacks on security protocols with a simplified tagging scheme
-
Trinity College Dublin, pp
-
Li, Y., Yang, W., Huang, C.-W.: Preventing type flaw attacks on security protocols with a simplified tagging scheme. In: ISICT 2004. Proc. Int. symp. on Information and communication technologies, Trinity College Dublin, pp. 244-249 (2004)
-
(2004)
ISICT 2004. Proc. Int. symp. on Information and communication technologies
, pp. 244-249
-
-
Li, Y.1
Yang, W.2
Huang, C.-W.3
-
15
-
-
35248886574
-
-
Ramanujam, R., Suresh, S.P.: Tagging makes secrecy decidable with unbounded nonces as well. In: Pandya, P.K., Radhakrishnan, J. (eds.) FST TCS 2003. LNCS, 2914, Springer, Heidelberg (2003)
-
Ramanujam, R., Suresh, S.P.: Tagging makes secrecy decidable with unbounded nonces as well. In: Pandya, P.K., Radhakrishnan, J. (eds.) FST TCS 2003. LNCS, vol. 2914, Springer, Heidelberg (2003)
-
-
-
|