-
1
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
Proc. CONCUR '00
-
R. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In Proc. CONCUR '00, volume 1877 of LNCS, pages 380-394, 2000.
-
(2000)
LNCS
, vol.1877
, pp. 380-394
-
-
Amadio, R.1
Lugiez, D.2
-
2
-
-
0346205107
-
Unification theory
-
A. Robinson and A. Voronkov, editors, chapter 8, Elsevier Science
-
F. Baader and W. Snyder. Unification theory. In A. Robinson and A. Voronkov, editors, Handbook of Automated Reasoning, volume 1, chapter 8, pages 445-532. Elsevier Science, 2001.
-
(2001)
Handbook of Automated Reasoning
, vol.1
, pp. 445-532
-
-
Baader, F.1
Snyder, W.2
-
3
-
-
84879529172
-
Symbolic trace analysis of cryptographic protocols
-
M. Boreale. Symbolic trace analysis of cryptographic protocols. In Proc. ICALP '01, pages 667-681, 2001.
-
(2001)
Proc. ICALP '01
, pp. 667-681
-
-
Boreale, M.1
-
5
-
-
0039334690
-
Verifying security protocols with Brutus
-
E. Clarke, S. Jha, and W. Marrero. Verifying security protocols with Brutus. ACM Transactions in Software Engineering Methodology (TOSEM), 9(4):443-487, 2000.
-
(2000)
ACM Transactions in Software Engineering Methodology (TOSEM)
, vol.9
, Issue.4
, pp. 443-487
-
-
Clarke, E.1
Jha, S.2
Marrero, W.3
-
6
-
-
35248897454
-
Tree automata with one memory, set constraints, and ping-pong protocols
-
H. Comon, V. Cortier, and J. Mitchell. Tree automata with one memory, set constraints, and ping-pong protocols. In Proc. ICALP '01, pages 682-693, 2001.
-
(2001)
Proc. ICALP '01
, pp. 682-693
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.3
-
7
-
-
9444264816
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
to appear
-
H. Comon-Lundh and V. Shmatikov. Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In Proc. LICS '03 (to appear), 2003.
-
(2003)
Proc. LICS '03
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
8
-
-
0001113391
-
An efficient algorithm for solving systems of Diophantine equations
-
E. Contejean and H. Devie. An efficient algorithm for solving systems of Diophantine equations. Information and Computation, 113(1):143-172, 1994.
-
(1994)
Information and Computation
, vol.113
, Issue.1
, pp. 143-172
-
-
Contejean, E.1
Devie, H.2
-
13
-
-
0041498690
-
Analyzing protocols that use modular exponentiation: Semantic unification techniques
-
to appear
-
D. Kapur, P. Narendran, and L. Wang. Analyzing protocols that use modular exponentiation: Semantic unification techniques. In Proc. RTA '03 (to appear), 2003.
-
(2003)
Proc. RTA '03
-
-
Kapur, D.1
Narendran, P.2
Wang, L.3
-
14
-
-
0017996760
-
Time, clocks and the ordering of events in a distributed system
-
L. Lamport. Time, clocks and the ordering of events in a distributed system. Comms. ACM, 21(7):558-565, 1978.
-
(1978)
Comms. ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
18
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
L. Paulson. The inductive approach to verifying cryptographic protocols. J. Computer Security, 6(1/2):85-128, 1998.
-
(1998)
J. Computer Security
, vol.6
, Issue.1-2
, pp. 85-128
-
-
Paulson, L.1
-
21
-
-
0002219322
-
An attack on a recursive authentication protocol: A cautionary tale
-
P. Ryan and S. Schneider. An attack on a recursive authentication protocol: A cautionary tale. Information Processing Letters, 65(1):7-10, 1998.
-
(1998)
Information Processing Letters
, vol.65
, Issue.1
, pp. 7-10
-
-
Ryan, P.1
Schneider, S.2
-
22
-
-
0032678887
-
Athena: A new efficient automatic checker for security protocol analysis
-
D. Song. Athena: a new efficient automatic checker for security protocol analysis. In Proc. 12th IEEE Computer Security Foundations Workshop, pages 192-202, 1999.
-
(1999)
Proc. 12th IEEE Computer Security Foundations Workshop
, pp. 192-202
-
-
Song, D.1
|