-
1
-
-
33745790245
-
Guessing attacks and the computational soundness of static equivalence
-
Aceto, L, Ingólfsdóttir, A, eds, FOSSACS 2006, Springer, Heidelberg
-
Abadi, M., Baudet, M., Warinschi, B.: Guessing attacks and the computational soundness of static equivalence. In: Aceto, L., Ingólfsdóttir, A. (eds.) FOSSACS 2006. LNCS, vol. 3921, pp. 398-412. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3921
, pp. 398-412
-
-
Abadi, M.1
Baudet, M.2
Warinschi, B.3
-
2
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 387(1-2), 2-32 (2006)
-
(2006)
Theoretical Computer Science
, vol.387
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
3
-
-
0035035153
-
Mobile values, new names, and secure communication
-
ACM Press, New York
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: 28th ACM Symposium on Principles of Programming Languages (POPL 2001), pp. 104-115. ACM Press, New York (2001)
-
(2001)
28th ACM Symposium on Principles of Programming Languages (POPL
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
38049162024
-
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, 4533, pp. 20-35. Springer, Heidelberg (2007)
-
Anantharaman, S., Narendran, P., Rusinowitch, M.: Intruders with caps. In: Baader, F. (ed.) RTA 2007. LNCS, vol. 4533, pp. 20-35. Springer, Heidelberg (2007)
-
-
-
-
5
-
-
33745778843
-
Deciding security of protocols against off-line guessing attacks
-
ACM Press, New York
-
Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: 12th ACM Conference on Computer and Communications Security (CCS 2005), pp. 16-25. ACM Press, New York (2005)
-
(2005)
12th ACM Conference on Computer and Communications Security (CCS
, pp. 16-25
-
-
Baudet, M.1
-
6
-
-
38049062912
-
Sécurité des protocoles cryptographiques: Aspects logiques et calculatoires
-
Thèse de doctorat, LSV, ENS Cachan, France 2007
-
Baudet, M.: Sécurité des protocoles cryptographiques: aspects logiques et calculatoires. Thèse de doctorat, LSV, ENS Cachan, France (2007)
-
-
-
Baudet, M.1
-
7
-
-
70350650355
-
-
Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. Research Report LSV-09-03, Laboratoire Spécification et Vérification, ENS Cachan, France, 28 pages (Feburary 2009)
-
Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. Research Report LSV-09-03, Laboratoire Spécification et Vérification, ENS Cachan, France, 28 pages (Feburary 2009)
-
-
-
-
8
-
-
26444541858
-
Computationally sound implementations of equational theories against passive adversaries
-
Caires, L, Italiano, G.F, Monteiro, L, Palamidessi, C, Yung, M, eds, ICALP 2005, Springer, Heidelberg
-
Baudet, M., Cortier, V., Kremer, S.: Computationally sound implementations of equational theories against passive adversaries. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 652-663. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 652-663
-
-
Baudet, M.1
Cortier, V.2
Kremer, S.3
-
9
-
-
0034822279
-
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
-
IEEE Comp. Soc. Press, Los Alamitos
-
Blanchet, B.: An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th Computer Security Foundations Workshop (CSFW 2001), pp. 82-96. IEEE Comp. Soc. Press, Los Alamitos (2001)
-
(2001)
14th Computer Security Foundations Workshop (CSFW
, pp. 82-96
-
-
Blanchet, B.1
-
10
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1), 3-51 (2008)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
11
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
IEEE Comp. Soc. Press, Los Alamitos
-
Chevalier, Y., Küsters, R., Rusinowitch, M., Turuani, M.: An NP decision procedure for protocol insecurity with XOR. In: 18th IEEE Symposium on Logic in Computer Science (LICS 2003). IEEE Comp. Soc. Press, Los Alamitos (2003)
-
(2003)
18th IEEE Symposium on Logic in Computer Science (LICS
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
12
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
IEEE Computer Society Press, Los Alamitos
-
Comon-Lundh, H., Shmatikov, V.: Intruder deductions, constraint solving and insecurity decision in presence of exclusive or. In: 18th IEEE Symposium on Logic in Computer Science (LICS 2003). IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
18th IEEE Symposium on Logic in Computer Science (LICS
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
14
-
-
38149055615
-
-
Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), 4790, pp. 196-210. Springer, Heidelberg (2007)
-
Cortier, V., Delaune, S.: Deciding knowledge in security protocols for monoidal equational theories. In: Dershowitz, N., Voronkov, A. (eds.) LPAR 2007. LNCS (LNAI), vol. 4790, pp. 196-210. Springer, Heidelberg (2007)
-
-
-
-
15
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
Cortier, V., Delaune, S., Lafourcade, P.: A survey of algebraic properties used in cryptographic protocols. Journal of Computer Security 14(1), 1-43 (2006)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
17
-
-
69949112592
-
Verifying privacy-type properties of electronic voting protocols
-
to appear
-
Delaune, S., Kremer, S., Ryan, M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security (to appear) (2008)
-
(2008)
Journal of Computer Security
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
18
-
-
0342658605
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Margaria, T, Steffen, B, eds, TACAS 1996, Springer, Heidelberg
-
Lowe, G.: Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In: Margaria, T., Steffen, B. (eds.) TACAS 1996. LNCS, vol. 1055, pp. 147-166. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1055
, pp. 147-166
-
-
Lowe, G.1
|