-
1
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
Amadio, R., Lugiez, D., Vanackére, V.: On the symbolic reduction of processes with cryptographic functions. Theor. Comput. Sci. 290(1), 695-740 (2003)
-
(2003)
Theor. Comput. Sci
, vol.290
, Issue.1
, pp. 695-740
-
-
Amadio, R.1
Lugiez, D.2
Vanackére, V.3
-
2
-
-
26444497860
-
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Team. The Avispa Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, P.H., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Team. The Avispa Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
14044277509
-
-
Armando, A., Compagna, L.: An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. In: Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2004). ENTCS, 125(1), pp. 91-108 (2005)
-
Armando, A., Compagna, L.: An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. In: Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2004). ENTCS, vol. 125(1), pp. 91-108 (2005)
-
-
-
-
5
-
-
0030078047
-
Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures
-
Baader, F., Schulz, K.U.: Unification in the Union of Disjoint Equational Theories: Combining Decision Procedures. Journal of Symbolic Computing 21(2), 211-243 (1996)
-
(1996)
Journal of Symbolic Computing
, vol.21
, Issue.2
, pp. 211-243
-
-
Baader, F.1
Schulz, K.U.2
-
6
-
-
19744367735
-
OFMC: A symbolic model checker for security protocols
-
Basin, D., Mödersheim, S., Viganò, L.: OFMC: A symbolic model checker for security protocols. International Journal of Information Security 4(3), 181-208 (2005)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
Viganò, L.3
-
7
-
-
33749413630
-
Automatic Verification of Security Protocols Using Approximations
-
RR-5727 October
-
Boichut, Y., Héam, P.-C., Kouchnarenko, O.: Automatic Verification of Security Protocols Using Approximations. INRIA Research Report RR-5727 (October 2005), http://www.inria.fr/rrrt/rr-5727.html
-
(2005)
INRIA Research Report
-
-
Boichut, Y.1
Héam, P.-C.2
Kouchnarenko, O.3
-
9
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
Orejas, F, Spirakis, P.G, van Leeuwen, J, eds, ICALP 2001, Springer, Heidelberg
-
Boreale, M.: Symbolic trace analysis of cryptographic protocols. In: Orejas, F., Spirakis, P.G., van Leeuwen, J. (eds.) ICALP 2001. LNCS, vol. 2076, pp. 667-681. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2076
, pp. 667-681
-
-
Boreale, M.1
-
10
-
-
0041967380
-
An NP decision procedure for protocol insecurity with xor
-
Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with xor. In: Proceedings of LICS 2003 (2003)
-
(2003)
Proceedings of LICS
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
11
-
-
35248865266
-
Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents
-
Pandya, P.K, Radhakrishnan, J, eds, FSTTCS 2003, Springer, Heidelberg
-
Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in Exponents. In: Pandya, P.K., Radhakrishnan, J. (eds.) FSTTCS 2003. LNCS, vol. 2914, pp. 124-135. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2914
, pp. 124-135
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
13
-
-
67650225702
-
-
Clark, J, Jacob, J, A Survey of Authentication Protocol Literature: Version 1.0, November 17 1997
-
Clark, J., Jacob, J.: A Survey of Authentication Protocol Literature: Version 1.0, November 17 (1997), www.cs.york.ac.uk/̃jac/papers/drareview. ps.gz
-
-
-
-
14
-
-
84958742278
-
-
Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, 2477, pp. 326- 341. Springer, Heidelberg (2002)
-
Corin, R., Etalle, S.: An improved constraint-based system for the verification of security protocols. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol. 2477, pp. 326- 341. Springer, Heidelberg (2002)
-
-
-
-
18
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Computer Society Press, Los Alamitos
-
Meadows, C.: Open issues in formal methods for cryptographic protocol analysis. In: Proceedings of DISCEX 2000, pp. 237-250. IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
Proceedings of DISCEX
, pp. 237-250
-
-
Meadows, C.1
-
20
-
-
67650216356
-
The Ephemerizer: Making Data Disappear. Technical report, Sun Labs
-
Perlman, R.: The Ephemerizer: Making Data Disappear. Technical report, Sun Labs (2005), http://www.research.sun.com/techrep/2005/smll-tr02005-140.pdf
-
-
-
Perlman, R.1
-
22
-
-
33749413267
-
-
Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, 4098, pp. 277-286. Springer, Heidelberg (2006)
-
Turuani, M.: The CL-Atse Protocol Analyser. In: Pfenning, F. (ed.) RTA 2006. LNCS, vol. 4098, pp. 277-286. Springer, Heidelberg (2006)
-
-
-
|