-
1
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 387(1-2), 2-32 (2006)
-
(2006)
Theoretical Computer Science
, vol.387
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
3
-
-
38049162024
-
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, 4533, pp. 20-35. Springer, Heidelberg (2007)
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533, pp. 20-35. Springer, Heidelberg (2007)
-
-
-
-
4
-
-
26444497860
-
-
Armando, A., et al.: The AVISPA Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, 3576, pp. 281-285. Springer, Heidelberg (2005)
-
Armando, A., et al.: The AVISPA Tool for the automated validation of internet security protocols and applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
-
-
-
-
6
-
-
50249164303
-
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
-
IEEE Comp. Soc. Press, Los Alamitos
-
Backes, M., Maffei, M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: IEEE Symposium on Security and Privacy (S&P 2008). IEEE Comp. Soc. Press, Los Alamitos (2008)
-
(2008)
IEEE Symposium on Security and Privacy (S&P
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
9
-
-
70350663117
-
YAPA: A generic tool for computing intruder knowledge
-
Treinen, R, ed, Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA, Brasiĺia, Brazil, June-July, Springer, Heidelberg to appear, 2009
-
Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. In: Treinen, R. (ed.) Proceedings of the 20th International Conference on Rewriting Techniques and Applications (RTA 2009), Brasiĺia, Brazil, June-July 2009. LNCS. Springer, Heidelberg (to appear, 2009)
-
(2009)
LNCS
-
-
Baudet, M.1
Cortier, V.2
Delaune, S.3
-
11
-
-
69949146153
-
-
Ciobǎcǎ, Ş.: KiSs (2009), http://www.lsv.ens-cachan. fr/̃ciobaca/kiss
-
(2009)
-
-
Ciobǎcǎ, S.1
KiSs2
-
12
-
-
69949159149
-
-
Ciobǎcǎ, Ş., Delaune, S., Kremer, S.: Computing knowledge in security protocol under convergent equational theories. Research Report LSV-09-05, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2009, 42 p. (2009)
-
Ciobǎcǎ, Ş., Delaune, S., Kremer, S.: Computing knowledge in security protocol under convergent equational theories. Research Report LSV-09-05, Laboratoire Spécification et Vérification, ENS Cachan, France, March 2009, 42 p. (2009)
-
-
-
-
14
-
-
38149055615
-
-
Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), 4790, pp. 196-210. Springer, Heidelberg (2007)
-
Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), vol. 4790, pp. 196-210. Springer, Heidelberg (2007)
-
-
-
-
15
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
17
-
-
84855190787
-
Intruder deduction for the equational theory of Abelian groups with distributive encryption
-
Lafourcade, P., Lugiez, D., Treinen, R.: Intruder deduction for the equational theory of Abelian groups with distributive encryption. Information and Computation 205(4), 581-623 (2007)
-
(2007)
Information and Computation
, vol.205
, Issue.4
, pp. 581-623
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
-
19
-
-
84956974327
-
Receipt-free electronic voting schemes for large scale elections
-
Christianson, B, Lomas, M, eds, Security Protocols 1997, Springer, Heidelberg
-
Okamoto, T.: Receipt-free electronic voting schemes for large scale elections. In: Christianson, B., Lomas, M. (eds.) Security Protocols 1997. LNCS, vol. 1361. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1361
-
-
Okamoto, T.1
-
20
-
-
0037453396
-
Protocol insecurity with finite number of sessions and composed keys is NP-complete
-
Rusinowitch, M., Turuani, M.: Protocol insecurity with finite number of sessions and composed keys is NP-complete. Theoretical Computer Science 299, 451-475 (2003)
-
(2003)
Theoretical Computer Science
, vol.299
, pp. 451-475
-
-
Rusinowitch, M.1
Turuani, M.2
|