-
1
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
M. Abadi and V. Cortier, Deciding knowledge in security protocols under equational theories, Theoretical Computer Science 387(1,2) (2006), 2-32.
-
(2006)
Theoretical Computer Science
, vol.387
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
0035035153
-
Mobile values new names and secure communication
-
ACM Press
-
M. Abadi and C. Fournet, Mobile values, new names, and secure communication, in: Proc. 28th Symposium on Principles of Programming Languages, ACM Press, 2001, pp. 104-115.
-
(2001)
Proc. 28th Symposium on Principles of Programming Languages
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
0037209773
-
On the symbolic reduction of processes with cryptographic functions
-
R. Amadio, D. Lugiez and V. Vanackère, On the symbolic reduction of processes with cryptographic functions, Theoretical Computer Science 290 (2002), 695-740.
-
(2002)
Theoretical Computer Science
, vol.290
, pp. 695-740
-
-
Amadio, R.1
Lugiez, D.2
Vanackère, V.3
-
6
-
-
38049062912
-
-
Thèse de doctorat, LSV, ENS Cachan, France, January
-
M. Baudet, Sécurité des protocoles cryptographiques: Aspects logiques et calculatoires, Thèse de doctorat, LSV, ENS Cachan, France, January 2007.
-
(2007)
Sécurité des Protocoles Cryptographiques: Aspects Logiques et Calculatoires
-
-
Baudet, M.1
-
7
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Comp. Soc. Press
-
B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, in: Proc. 14th Computer Security Foundations Workshop, IEEE Comp. Soc. Press, 2001, pp. 82-96.
-
(2001)
Proc. 14th Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
8
-
-
26844508455
-
Automated verification of selected equivalences for security protocols
-
IEEE Comp. Soc. Press
-
B. Blanchet, M. Abadi and C. Fournet, Automated verification of selected equivalences for security protocols, in: Proc. 20th Symposium on Logic in Computer Science, IEEE Comp. Soc. Press, 2005, pp. 331-340.
-
(2005)
Proc. 20th Symposium on Logic in Computer Science
, pp. 331-340
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
10
-
-
35048863862
-
Symbolic bisimulation in the spi calculus
-
Lecture Notes in Computer Science, Springer
-
J. Borgström, S. Briais and U. Nestmann, Symbolic bisimulation in the spi calculus, in: Proc. 15th Int. Conference on Concurrency Theory, Lecture Notes in Computer Science, Vol.3170, Springer, 2004, pp. 161-176.
-
(2004)
Proc. 15th Int. Conference on Concurrency Theory
, vol.3170
, pp. 161-176
-
-
Borgström, J.1
Briais, S.2
Nestmann, U.3
-
12
-
-
33947622187
-
Coercion-resistance and receipt-freeness in electronic voting
-
IEEE Comp. Soc. Press
-
S. Delaune, S. Kremer and M.D. Ryan, Coercion-resistance and receipt-freeness in electronic voting, in: Proc. 19th Computer Security Foundations Workshop, IEEE Comp. Soc. Press, 2006, pp. 28-39.
-
(2006)
Proc. 19th Computer Security Foundations Workshop
, pp. 28-39
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
14
-
-
38349000896
-
Symbolic bisimulation for the applied pi-calculus
-
Lecture Notes in Computer Science, Springer
-
S. Delaune, S. Kremer and M.D. Ryan, Symbolic bisimulation for the applied pi-calculus, in: Proc. 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07), Lecture Notes in Computer Science, Vol.4855, Springer, 2007, pp. 133-145.
-
(2007)
Proc. 27th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS'07)
, vol.4855
, pp. 133-145
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
15
-
-
77950279302
-
Symbolic bisimulation for the applied pi calculus
-
Laboratoire Spécification et Vérification, ENS Cachan, France
-
S. Delaune, S. Kremer and M.D. Ryan, Symbolic bisimulation for the applied pi calculus, Research Report LSV-08-32, Laboratoire Spécification et Vérification, ENS Cachan, France, 2008, 73 pp.
-
(2008)
Research Report LSV-08-32
, pp. 73
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
17
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
Lecture Notes in Computer Science, Springer
-
A. Fujioka, T. Okamoto and K. Ohta, A practical secret voting scheme for large scale elections, in: Advances in Cryptology - AUSCRYPT '92, Lecture Notes in Computer Science, Vol.718, Springer, 1992, pp. 244-251.
-
(1992)
Advances in Cryptology - AUSCRYPT '92
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
19
-
-
23144432349
-
Analysis of an electronic voting protocol in the applied pi-calculus
-
Lecture Notes in Computer Science, Springer
-
S. Kremer and M.D. Ryan, Analysis of an electronic voting protocol in the applied pi-calculus, in: Proc. 14th European Symposium on Programming, Lecture Notes in Computer Science, Vol.3444, Springer, 2005, pp. 186-200.
-
(2005)
Proc. 14th European Symposium on Programming
, vol.3444
, pp. 186-200
-
-
Kremer, S.1
Ryan, M.D.2
-
21
-
-
44049113210
-
A calculus of mobile processes, part i
-
R. Milner, J. Parrow and D. Walker, A calculus of mobile processes, part I, Information and Computation 100(1) (1992), 1-40.
-
(1992)
Information and Computation
, vol.100
, Issue.1
, pp. 1-40
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
|