-
1
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
Basin, D., Mödersheim, S., Viganò, L.: OFMC: A symbolic model checker for security protocols. Int'l Journal of Information Security 4(3), 181-208 (2005)
-
(2005)
Int'l Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
2
-
-
0003962322
-
-
MIT Press, Cambridge
-
Clarke, E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (2001)
-
(2001)
Model Checking
-
-
Clarke, E.M.1
Grumberg, O.2
Peled, D.A.3
-
4
-
-
57049137696
-
Effectively checking or disproving the finite variant property
-
Proc. of Term Rewriting and Applications, RTA, Springer, Heidelberg to appear
-
Escobar, S., Meseguer, J., Sasse, R.: Effectively checking or disproving the finite variant property. In: Proc. of Term Rewriting and Applications, RTA 2008. LNCS. Springer, Heidelberg (to appear, 2008)
-
(2008)
LNCS
-
-
Escobar, S.1
Meseguer, J.2
Sasse, R.3
-
5
-
-
57049183048
-
Variant narrowing and equational unification
-
Escobar, S., Meseguer, J., Sasse, R.: Variant narrowing and equational unification. In: Proc. of Rewriting Logic and its Applications, WRLA 2008 (2008)
-
(2008)
Proc. of Rewriting Logic and its Applications, WRLA
-
-
Escobar, S.1
Meseguer, J.2
Sasse, R.3
-
6
-
-
67649409134
-
Diffie-hellman cryptographic reasoning in the Maude-NRL Protocol Analyzer
-
Escobar, S., Hendrix, J., Meadows, C., Meseguer, J.: Diffie-hellman cryptographic reasoning in the Maude-NRL Protocol Analyzer. In: Proc. of Security and Rewriting Techniques, SecReT 2007 (2007)
-
(2007)
Proc. of Security and Rewriting Techniques, SecReT
-
-
Escobar, S.1
Hendrix, J.2
Meadows, C.3
Meseguer, J.4
-
7
-
-
33750477656
-
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
-
Escobar, S., Meadows, C., Meseguer, J.: A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theoretical Computer Science 367(1-2) (2006)
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
8
-
-
34250834342
-
Equational cryptographic reasoning in the maude-nrl protocol analyzer
-
Escobar, S., Meadows, C., Meseguer, J.: Equational cryptographic reasoning in the maude-nrl protocol analyzer. Electronic Notes in Theoretical Computer Science 171(4), 23-36 (2007)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.171
, Issue.4
, pp. 23-36
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
9
-
-
38049123677
-
-
Escobar, S., Meseguer, J.: Symbolic model checking of infinite-state systems using narrowing. In: Baader, F. (ed.) RTA 2007. LNCS, 4533, pp. 153-168. Springer, Heidelberg (2007)
-
Escobar, S., Meseguer, J.: Symbolic model checking of infinite-state systems using narrowing. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533, pp. 153-168. Springer, Heidelberg (2007)
-
-
-
-
10
-
-
0033344295
-
Strand Spaces: What Makes a Security Protocol Correct?
-
Thayer Fabrega, F.J., Herzog, J., Guttman, J.: Strand Spaces: What Makes a Security Protocol Correct? Journal of Computer Security 7, 191-230 (1999)
-
(1999)
Journal of Computer Security
, vol.7
, pp. 191-230
-
-
Thayer Fabrega, F.J.1
Herzog, J.2
Guttman, J.3
-
11
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C.: The NRL protocol analyzer: An overview. Journal of logic programming 26(2), 113-131 (1996)
-
(1996)
Journal of logic programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
12
-
-
0027113376
-
Conditional rewriting logic as a unified model of concurrency
-
Meseguer, J.: Conditional rewriting logic as a unified model of concurrency. Theoretical Computer Science 96(1), 73-155 (1992)
-
(1992)
Theoretical Computer Science
, vol.96
, Issue.1
, pp. 73-155
-
-
Meseguer, J.1
-
13
-
-
84957873927
-
-
Meseguer, J.: Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.) WADT 1997. LNCS, 1376, pp. 18-61. Springer, Heidelberg (1998)
-
Meseguer, J.: Membership algebra as a logical framework for equational specification. In: Parisi-Presicce, F. (ed.) WADT 1997. LNCS, vol. 1376, pp. 18-61. Springer, Heidelberg (1998)
-
-
-
-
14
-
-
34047234972
-
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
-
Meseguer, J., Thati, P.: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols. Higher-Order and Symbolic Computation 20(1-2), 123-160 (2007)
-
(2007)
Higher-Order and Symbolic Computation
, vol.20
, Issue.1-2
, pp. 123-160
-
-
Meseguer, J.1
Thati, P.2
-
15
-
-
0031627781
-
Efficient finite-state analysis for large security protocols
-
IEEE Computer Society Press, Los Alamitos
-
Shmatikov, V., Stern, U.: Efficient finite-state analysis for large security protocols. In: 11th Computer Security Foundations Workshop - CSFW-11. IEEE Computer Society Press, Los Alamitos (1998)
-
(1998)
11th Computer Security Foundations Workshop - CSFW-11
-
-
Shmatikov, V.1
Stern, U.2
-
16
-
-
1242286270
-
-
Terese ed, Cambridge University Press, Cambridge
-
Terese (ed.): Term Rewriting Systems. Cambridge University Press, Cambridge (2003)
-
(2003)
Term Rewriting Systems
-
-
|