-
1
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2-32 (2006)
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
0035035153
-
Mobile values, new names, and secure communication
-
January, 2001
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proceedings of the 28th ACM Symposium on Principles of Programming Languages (POPL 2001), January 2001, pp. 104-115 (2001)
-
(2001)
Proceedings of the 28th ACM Symposium on Principles of Programming Languages (POPL
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
84879078812
-
-
Abadi, M., Rogaway, P.: Reconciling two views of cryptography: the computational soundness of formal encryption. In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, 1872. Springer, Heidelberg (2000)
-
Abadi, M., Rogaway, P.: Reconciling two views of cryptography: the computational soundness of formal encryption. In: Watanabe, O., Hagiya, M., Ito, T., van Leeuwen, J., Mosses, P.D. (eds.) TCS 2000. LNCS, vol. 1872. Springer, Heidelberg (2000)
-
-
-
-
5
-
-
38049162024
-
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, 4533. Springer, Heidelberg (2007)
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533. Springer, Heidelberg (2007)
-
-
-
-
6
-
-
53049083987
-
-
Arapinis, M., Delaune, S., Kremer, S.: From one session to many: Dynamic tags for security protocols. Research Report LSV-08-16, Laboratoire Spécification et Vérification, ENS Cachan, France (May 2008)
-
Arapinis, M., Delaune, S., Kremer, S.: From one session to many: Dynamic tags for security protocols. Research Report LSV-08-16, Laboratoire Spécification et Vérification, ENS Cachan, France (May 2008)
-
-
-
-
7
-
-
38049084697
-
-
Arnaud, M., Cortier, V., Delaune, S.: Combining algorithms for deciding knowledge in security protocols. In: Konev, B., Wolter, F. (eds.) FroCos 2007. LNCS (LNAI), 4720. Springer, Heidelberg (2007)
-
Arnaud, M., Cortier, V., Delaune, S.: Combining algorithms for deciding knowledge in security protocols. In: Konev, B., Wolter, F. (eds.) FroCos 2007. LNCS (LNAI), vol. 4720. Springer, Heidelberg (2007)
-
-
-
-
9
-
-
18744415053
-
-
Basin, D., Mödersheim, S., Viganò, L.: Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In: Proceedings of CCS 2003, pp. 335-344. ACM Press, New York (2003)
-
Basin, D., Mödersheim, S., Viganò, L.: Constraint Differentiation: A New Reduction Technique for Constraint-Based Analysis of Security Protocols. In: Proceedings of CCS 2003, pp. 335-344. ACM Press, New York (2003)
-
-
-
-
10
-
-
33646262130
-
-
Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), 3835. Springer, Heidelberg (2005)
-
Basin, D., Mödersheim, S., Viganò, L.: Algebraic intruder deductions. In: Sutcliffe, G., Voronkov, A. (eds.) LPAR 2005. LNCS (LNAI), vol. 3835. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
33745778843
-
Deciding security of protocols against off-line guessing attacks
-
Alexandria, Virginia, USA, November, ACM Press, New York () 2005
-
Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, Virginia, USA, November 2005, pp. 16-25. ACM Press, New York (2005)
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS
, pp. 16-25
-
-
Baudet, M.1
-
12
-
-
38049062912
-
Sécurité des protocoles cryptographiques : Aspects logiques et calculators
-
Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France January
-
Baudet, M.: Sécurité des protocoles cryptographiques : aspects logiques et calculators. Thèse de doctorat, Laboratoire Spécification et Vérification, ENS Cachan, France (January 2007)
-
(2007)
-
-
Baudet, M.1
-
14
-
-
49949093562
-
Normal proofs in intruder theories
-
Revised Selected Papers of the 11th Asian Computing Science Conference ASIAN, Springer, Heidelberg
-
Bernat, V., Comon-Lundh, H.: Normal proofs in intruder theories. In: Revised Selected Papers of the 11th Asian Computing Science Conference (ASIAN 2006). LNCS, vol. 4435. Springer, Heidelberg (2008)
-
(2006)
LNCS
, vol.4435
-
-
Bernat, V.1
Comon-Lundh, H.2
-
15
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
Nova Scotia, Canada, June, IEEE Computer Society, Los Alamitos
-
Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton, Nova Scotia, Canada, June 2001, pp. 82-96. IEEE Computer Society, Los Alamitos (2001)
-
(2001)
14th IEEE Computer Security Foundations Workshop (CSFW-14), Cape Breton
, pp. 82-96
-
-
Blanchet, B.1
-
16
-
-
53049098668
-
-
Blanchet, B.: An automatic security protocol verifier based on resolution theorem proving (invited tutorial). In: Nieuwenhuis, R. (ed.) CADE 2005. LNCS (LNAI), 3632. Springer, Heidelberg (2005)
-
Blanchet, B.: An automatic security protocol verifier based on resolution theorem proving (invited tutorial). In: Nieuwenhuis, R. (ed.) CADE 2005. LNCS (LNAI), vol. 3632. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1), 3-51 (2008)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
18
-
-
13644264990
-
Verification of cryptographic protocols: Tagging enforces termination
-
Blanchet, B., Podelski, A.: Verification of cryptographic protocols: Tagging enforces termination. Theoretical Computer Science 333(1-2), 67-90 (2005)
-
(2005)
Theoretical Computer Science
, vol.333
, Issue.1-2
, pp. 67-90
-
-
Blanchet, B.1
Podelski, A.2
-
19
-
-
38149133354
-
-
Bursuc, S., Comon-Lundh, H., Delaune, S.: Deducibility constraints, equational theory and electronic money. In: Comon-Lundh, H., Kirchner, C., Kirchner, H. (eds.) Jouannaud Festschrift. LNCS, 4600. Springer, Heidelberg (2007)
-
Bursuc, S., Comon-Lundh, H., Delaune, S.: Deducibility constraints, equational theory and electronic money. In: Comon-Lundh, H., Kirchner, C., Kirchner, H. (eds.) Jouannaud Festschrift. LNCS, vol. 4600. Springer, Heidelberg (2007)
-
-
-
-
21
-
-
35248865266
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
Pandya, P.K, Radhakrishnan, J, eds, FSTTCS 2003, Springer, Heidelberg
-
Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol. 2914. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2914
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
22
-
-
0041967380
-
-
Chevalier, Y., Küsters, R,., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: Eighteenth Annual IEEE Symposium on Logic in Computer Science (LICS) (2003)
-
Chevalier, Y., Küsters, R,., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: Eighteenth Annual IEEE Symposium on Logic in Computer Science (LICS) (2003)
-
-
-
-
23
-
-
14044254755
-
Deciding the security of protocols with commuting public key encryption
-
Proc. Workshop on Automated Reasoning for Security Protocol Analysis ARSPA
-
Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: Deciding the security of protocols with commuting public key encryption. In: Proc. Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA). Electronic Notes in Theoretical Computer Science, vol. 125 (2004)
-
(2004)
Electronic Notes in Theoretical Computer Science
, vol.125
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
24
-
-
26444458330
-
Combining Intruder Theories
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Chevalier, Y., Rusinowitch, M.: Combining Intruder Theories. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
-
-
Chevalier, Y.1
Rusinowitch, M.2
-
25
-
-
33749446224
-
-
Chevalier, Y., Rusinowitch, M.: Hierarchical Combination of Intruder Theories. In: Pfenning, F. (ed.) RTA 2006. LNCS, 4098, pp. 108-122. Springer, Heidelberg (2006)
-
Chevalier, Y., Rusinowitch, M.: Hierarchical Combination of Intruder Theories. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 108-122. Springer, Heidelberg (2006)
-
-
-
-
26
-
-
15744388991
-
Tree automata with one memory, set constraints and cryptographic protocols
-
Feb
-
H. Comon and V. Cortier. Tree automata with one memory, set constraints and cryptographic protocols. Theoretical Computer Science, 331(1): 143-214, Feb. 2005.
-
(2005)
Theoretical Computer Science
, vol.331
, Issue.1
, pp. 143-214
-
-
Comon, H.1
Cortier, V.2
-
27
-
-
84947780217
-
-
Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, 2706. Springer, Heidelberg (2003)
-
Comon-Lundh, H., Cortier, V.: New decidability results for fragments of first-order logic and application to cryptographic protocols. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706. Springer, Heidelberg (2003)
-
-
-
-
29
-
-
24944569389
-
-
Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, 3467. Springer, Heidelberg (2005)
-
Comon-Lundh, H., Delaune, S.: The finite variant property: How to get rid of some algebraic properties. In: Giesl, J. (ed.) RTA 2005. LNCS, vol. 3467. Springer, Heidelberg (2005)
-
-
-
-
30
-
-
35248836596
-
Easy intruder deductions
-
Dershowitz, N, ed, Verification: Theory and Practice, Springer, Heidelberg
-
Comon-Lundh, H., Treinen, R.: Easy intruder deductions. In: Dershowitz, N. (ed.) Verification: Theory and Practice. LNCS, vol. 2772. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2772
-
-
Comon-Lundh, H.1
Treinen, R.2
-
31
-
-
38349000750
-
Safely composing security protocols
-
Arvind, V, Prasad, S, eds, FSTTCS 2007, Springer, Heidelberg
-
Cortier, V., Delaitre, J., Delaune, S.: Safely composing security protocols. In: Arvind, V., Prasad, S. (eds.) FSTTCS 2007. LNCS, vol. 4855. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4855
-
-
Cortier, V.1
Delaitre, J.2
Delaune, S.3
-
32
-
-
38149055615
-
-
Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR, 2007. LNCS (LNAI), 4790. Springer, Heidelberg (2007)
-
Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR, 2007. LNCS (LNAI), vol. 4790. Springer, Heidelberg (2007)
-
-
-
-
33
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
35
-
-
31344437591
-
Easy intruder deduction problems with homomorphisms
-
Delaune, S.: Easy intruder deduction problems with homomorphisms. Information Processing Letters 97(6), 213-218 (2006)
-
(2006)
Information Processing Letters
, vol.97
, Issue.6
, pp. 213-218
-
-
Delaune, S.1
-
36
-
-
33947622187
-
Coercion-resistance and receipt-freeness in electronic voting
-
IEEE Computer Society Press, Los Alamitos
-
Delaune, S., Kremer, S., Ryan, M.D.: Coercion-resistance and receipt-freeness in electronic voting. In: Proceedings of the 19th Computer Security Foundations Workshop (CSFW). IEEE Computer Society Press, Los Alamitos (2006)
-
(2006)
Proceedings of the 19th Computer Security Foundations Workshop (CSFW)
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
37
-
-
40149109030
-
Symbolic protocol analysis for monoidal equational theories
-
Delaune, S., Lafourcade, P., Lugiez, D., Treinen, R.: Symbolic protocol analysis for monoidal equational theories. Information and Computation 206, 312-351 (2008)
-
(2008)
Information and Computation
, vol.206
, pp. 312-351
-
-
Delaune, S.1
Lafourcade, P.2
Lugiez, D.3
Treinen, R.4
-
38
-
-
38149058163
-
-
Delaune, S., Lin, H.: Protocol verification via rigid/flexible resolution. In: Dershowitz, N., Voronkov, A. (eds.) LPAR, 2007. LNCS (LNAI), 4790. Springer, Heidelberg (2007)
-
Delaune, S., Lin, H.: Protocol verification via rigid/flexible resolution. In: Dershowitz, N., Voronkov, A. (eds.) LPAR, 2007. LNCS (LNAI), vol. 4790. Springer, Heidelberg (2007)
-
-
-
-
39
-
-
0002612248
-
Resolution decision procedure
-
Robinson, A, Voronkov, A, eds, ch. 25, North-Holland, Amsterdam
-
Fermüller, C., Leitsch, A., Hustadt, U., Tamet, T.: Resolution decision procedure. In: Robinson, A., Voronkov, A. (eds.) Handbook of Automated Reasoning, ch. 25, vol. 2, pp. 1793-1849. North-Holland, Amsterdam (2001)
-
(2001)
Handbook of Automated Reasoning
, vol.2
, pp. 1793-1849
-
-
Fermüller, C.1
Leitsch, A.2
Hustadt, U.3
Tamet, T.4
-
41
-
-
51749119261
-
-
Küsters, R, Tuengerthal, M, Joint state theorems for public-key encryption and digital signature functionalities with local computations. In: Computer Security Foundations CSF
-
Küsters, R., Tuengerthal, M.: Joint state theorems for public-key encryption and digital signature functionalities with local computations. In: Computer Security Foundations (CSF 2008) (2008)
-
(2008)
-
-
-
42
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Information Processing Letters 56(3), 131-133 (1996)
-
(1996)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
43
-
-
0033353968
-
Towards a completeness result for model checking of security protocols
-
Lowe, G.: Towards a completeness result for model checking of security protocols. Journal of Computer Security 7(1) (1999)
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
-
-
Lowe, G.1
-
44
-
-
0027578148
-
Automatic recognition of tractability in inference relations
-
McAllester, D.: Automatic recognition of tractability in inference relations. J. ACM 40(2) (1993)
-
(1993)
J. ACM
, vol.40
, Issue.2
-
-
McAllester, D.1
-
45
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 113-131 (1996)
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
48
-
-
35248886574
-
Tagging makes secrecy decidable with unbounded nonces as well
-
Pandya, P.K, Radhakrishnan, J, eds, FSTTCS 2003, Springer, Heidelberg
-
Ramanujam, R., Suresh, S.P.: Tagging makes secrecy decidable with unbounded nonces as well. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol. 2914, pp. 363-374. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2914
, pp. 363-374
-
-
Ramanujam, R.1
Suresh, S.P.2
-
50
-
-
84957640213
-
-
Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), 1632, pp. 314-328. Springer, Heidelberg (1999)
-
Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), vol. 1632, pp. 314-328. Springer, Heidelberg (1999)
-
-
-
|