-
1
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
Amadio, R., Lugiez, D., Vanackère, V.: On the symbolic reduction of processes with cryptographic functions. Theor. Comput. Sci. 290(1), 695-740 (2003)
-
(2003)
Theor. Comput. Sci
, vol.290
, Issue.1
, pp. 695-740
-
-
Amadio, R.1
Lugiez, D.2
Vanackère, V.3
-
2
-
-
38049162024
-
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps. In: Baader, F. (ed.) RTA 2007. LNCS, 4533, Springer, Heidelberg (2007)
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with Caps. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533, Springer, Heidelberg (2007)
-
-
-
-
3
-
-
38149136172
-
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
-
Copenhagen, Denmark July 25-26
-
Armando, A., Compagna, L.: Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning. In: Foundation of Computer Security & Verification Workshops, Copenhagen, Denmark (July 25-26, 2002)
-
(2002)
Foundation of Computer Security & Verification Workshops
-
-
Armando, A.1
Compagna, L.2
-
6
-
-
84956866842
-
-
Wilson, S.B., Menezes, A.: Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, 1560, pp. 154-170. Springer, Heidelberg (1999)
-
Wilson, S.B., Menezes, A.: Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 154-170. Springer, Heidelberg (1999)
-
-
-
-
7
-
-
38348999962
-
-
Chevalier, Y., Kourjieh, M.: Key substitution in the symbolic analysis of cryptographic protocols. Technical report, IRIT (2007)
-
Chevalier, Y., Kourjieh, M.: Key substitution in the symbolic analysis of cryptographic protocols. Technical report, IRIT (2007)
-
-
-
-
8
-
-
38049024456
-
-
Chevalier, Y., Lugiez, D., Rusinowitch, M.: Towards an Automatic Analysis of Web Services Security. In: Konev, B., Wolter, F. (eds.) Frocos 2007. LNCS (LNAI), 4720, pp. 133-147. Springer, Heidelberg (2007)
-
Chevalier, Y., Lugiez, D., Rusinowitch, M.: Towards an Automatic Analysis of Web Services Security. In: Konev, B., Wolter, F. (eds.) Frocos 2007. LNCS (LNAI), vol. 4720, pp. 133-147. Springer, Heidelberg (2007)
-
-
-
-
9
-
-
26444458330
-
Combining Intruder Theories
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Chevalier, Y., Rusinowitch, M.: Combining Intruder Theories. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 639-651. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 639-651
-
-
Chevalier, Y.1
Rusinowitch, M.2
-
11
-
-
0023985465
-
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks. SIAM J. Comput. 17(2), 281-308 (1988)
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
12
-
-
84958952153
-
-
Hirose, S., Yoshida, S.: An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, 1431, pp. 135-148. Springer, Heidelberg (1998)
-
Hirose, S., Yoshida, S.: An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 135-148. Springer, Heidelberg (1998)
-
-
-
-
13
-
-
85035020357
-
Canonical forms and unification
-
Bibel, W, Kowalski, R, eds, Springer, Heidelberg
-
Hullot, J.M.: Canonical forms and unification. In: Bibel, W., Kowalski, R. (eds.) Conference on Automated Deduction, vol. 87, pp. 318-334. Springer, Heidelberg (1980)
-
(1980)
Conference on Automated Deduction
, vol.87
, pp. 318-334
-
-
Hullot, J.M.1
-
14
-
-
0041052430
-
Simple word problems in universal algebras
-
Siekmann, J, Wrightson, G, eds, Classical Papers on Computational Logic 1967-1970, pp, Springer, Heidelberg
-
Knuth, D.E., Bendix, P.B.: Simple word problems in universal algebras. In: Siekmann, J., Wrightson, G. (eds.) Automation of Reasoning 2: Classical Papers on Computational Logic 1967-1970, pp. 342-376. Springer, Heidelberg (1983)
-
(1983)
Automation of Reasoning
, vol.2
, pp. 342-376
-
-
Knuth, D.E.1
Bendix, P.B.2
-
15
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C.: The NRL protocol analyzer: an overview. Journal of Logic Programming 26(2), 113-131 (1996)
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
16
-
-
3843066626
-
-
Menezes, A., Smart, N.P.: Security of Signature Schemes in a Multi-User Setting. Des. Codes Cryptography 33(3), 261-274 (2004)
-
Menezes, A., Smart, N.P.: Security of Signature Schemes in a Multi-User Setting. Des. Codes Cryptography 33(3), 261-274 (2004)
-
-
-
-
17
-
-
26444580274
-
-
Pornin, T., Stern, J.P.: Digital signatures do not guarantee exclusive ownership. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 138-150. Springer, Heidelberg (2005)
-
Pornin, T., Stern, J.P.: Digital signatures do not guarantee exclusive ownership. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 138-150. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
84957640213
-
Towards an Automatic Analysis of Security Protocols in FirstOrder Logic
-
Ganzinger, H, ed, Automated Deduction, CADE-16, Springer, Heidelberg
-
Weidenbach, C.: Towards an Automatic Analysis of Security Protocols in FirstOrder Logic. In: Ganzinger, H. (ed.) Automated Deduction - CADE-16. LNCS (LNAI), vol. 1632, pp. 314-328. Springer, Heidelberg (1999)
-
(1999)
LNCS (LNAI
, vol.1632
, pp. 314-328
-
-
Weidenbach, C.1
|