-
1
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 387(1-2), 2-32 (2006)
-
(2006)
Theoretical Computer Science
, vol.387
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
0035035153
-
Mobile values, new names, and secure communication
-
Abadi, M., Fournet, C.:Mobile values, new names, and secure communication. In: Proc. 28th Symposium on Principles of Programming Languages, pp. 104-115 (2001)
-
(2001)
Proc. 28th Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
50249164303
-
Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol
-
Backes,M., Maffei,M., Unruh, D.: Zero-knowledge in the applied pi-calculus and automated verification of the direct anonymous attestation protocol. In: Proc. 29th IEEE Symposium on Security and Privacy (2008)
-
(2008)
Proc. 29th IEEE Symposium on Security and Privacy
-
-
Backes, M.1
Maffei, M.2
Unruh, D.3
-
4
-
-
58449096556
-
Knowledge-based modelling of voting protocols
-
Baskar, A., Ramanujam, R., Suresh, S.P.: Knowledge-based modelling of voting protocols. In: Proc. 11th Conference on Theoretical Aspects of Rationality and Knowledge, pp. 62-71 (2007)
-
(2007)
Proc. 11th Conference on Theoretical Aspects of Rationality and Knowledge
, pp. 62-71
-
-
Baskar, A.1
Ramanujam, R.2
Suresh, S.P.3
-
5
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: Proc. 14th Computer Security Foundations Workshop, pp. 82-96 (2001)
-
(2001)
Proc. 14th Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
8
-
-
0025386404
-
A logic of authentication
-
Burrows, M., Abadi, M., Needham, R.M.: A logic of authentication. ACM Trans. Comput. Syst. 8(1), 18-36 (1990)
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
9
-
-
70349321824
-
-
Chadha, R., Delaune, S., Kremer, S.: Epistemic logic for the applied pi-calculus. Research Report LSV-09-06, Laboratoire Spécification et Vérification, ENS Cachan, France (March 2009)
-
Chadha, R., Delaune, S., Kremer, S.: Epistemic logic for the applied pi-calculus. Research Report LSV-09-06, Laboratoire Spécification et Vérification, ENS Cachan, France (March 2009)
-
-
-
-
10
-
-
33750194652
-
Formal analysis of multi-party contract signing
-
Chadha, R., Kremer, S., Scedrov, A.: Formal analysis of multi-party contract signing. Journal of Automated Reasoning 36(1-2), 39-83 (2006)
-
(2006)
Journal of Automated Reasoning
, vol.36
, Issue.1-2
, pp. 39-83
-
-
Chadha, R.1
Kremer, S.2
Scedrov, A.3
-
12
-
-
27144466741
-
PS-LTL for constraint-based security protocol analysis
-
Corin, R., Saptawijaya, A., Etalle, S.: PS-LTL for constraint-based security protocol analysis. In: Proc. 21st International Conference on Logic Programming, pp. 439-440 (2005)
-
(2005)
Proc. 21st International Conference on Logic Programming
, pp. 439-440
-
-
Corin, R.1
Saptawijaya, A.2
Etalle, S.3
-
13
-
-
38349003243
-
Operational and epistemic approaches to protocol analysis: Bridging the gap
-
Dechesne, F., Mousavi, M.R., Orzan, S.: Operational and epistemic approaches to protocol analysis: Bridging the gap. In: Proc. 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning, pp. 226-241 (2007)
-
(2007)
Proc. 14th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning
, pp. 226-241
-
-
Dechesne, F.1
Mousavi, M.R.2
Orzan, S.3
-
14
-
-
68249084846
-
Verifying privacy-type properties of electronic voting protocols
-
to appear
-
Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security (2009) (to appear)
-
(2009)
Journal of Computer Security
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
15
-
-
0003730235
-
-
MIT Press, Cambridge
-
Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning About Knowledge. MIT Press, Cambridge (1995)
-
(1995)
Reasoning About Knowledge
-
-
Fagin, R.1
Halpern, J.Y.2
Moses, Y.3
Vardi, M.Y.4
-
16
-
-
24144492346
-
Anonymity and information hiding in multiagent systems
-
Halpern, J.Y., O'Neill, K.R.: Anonymity and information hiding in multiagent systems. Journal of Computer Security 13(3), 483-512 (2005)
-
(2005)
Journal of Computer Security
, vol.13
, Issue.3
, pp. 483-512
-
-
Halpern, J.Y.1
O'Neill, K.R.2
-
17
-
-
0344875575
-
Information hiding, anonymity and privacy: A modular approach
-
Hughes, D., Shmatikov, V.: Information hiding, anonymity and privacy: a modular approach. Journal of Computer Security 12(1), 3-36 (2004)
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 3-36
-
-
Hughes, D.1
Shmatikov, V.2
-
18
-
-
33847685950
-
-
Hüttel, H., Pedersen, M.D.: A logical characterisation of static equivalence. Electr. Notes Theor. Comput. Sci. 173, 139-157 (2007)
-
Hüttel, H., Pedersen, M.D.: A logical characterisation of static equivalence. Electr. Notes Theor. Comput. Sci. 173, 139-157 (2007)
-
-
-
-
20
-
-
33846808999
-
Epistemic verification of anonymity. Electr
-
van Eijck, J., Orzan, S.: Epistemic verification of anonymity. Electr. Notes Theor. Comput. Sci. 168, 159-174 (2007)
-
(2007)
Notes Theor. Comput. Sci
, vol.168
, pp. 159-174
-
-
van Eijck, J.1
Orzan, S.2
|