-
2
-
-
0004060205
-
-
Available on:, release October, 1rst
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison, and M. Tommasi. Tree Automata Techniques and Applications. Available on: http://www.grappa.univ-lille3.fr/tata, 1997. release October, 1rst 2002.
-
(1997)
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Lugiez, D.5
Tison, S.6
Tommasi, M.7
-
3
-
-
84947780217
-
New decidability results for fragments of first-order logic and application to cryptographic protocols
-
of Lecture Notes in Computer Science, Springer
-
H. Comon-Lundh and V. Cortier. New Decidability Results for Fragments of First-order Logic and Application to Cryptographic Protocols. In Proceedings of the 14th Internatioinal Conference on Rewriting Techniques and Applications (RTA 2003), volume 2706 of Lecture Notes in Computer Science, pages 148-164. Springer, 2003.
-
(2003)
Proceedings of the 14th Internatioinal Conference on Rewriting Techniques and Applications (RTA 2003)
, vol.2706
, pp. 148-164
-
-
Comon-Lundh, H.1
Cortier, V.2
-
5
-
-
0005240447
-
A cryptographic evaluation of IPsec
-
Available from
-
N. Ferguson and B. Schneier. A Cryptographic Evaluation of IPsec. Technical report, 2000. Available from http://www.counterpane.com/ipsecpdf.
-
(2000)
Technical Report
-
-
Ferguson, N.1
Schneier, B.2
-
7
-
-
77952341753
-
Selecting theories and nonce generation for recursive protocols
-
Institut für Informatik, CAU Kiel, Germany
-
K. O. Kürtz. Selecting Theories and Nonce Generation for Recursive Protocols. Technical Report 0709, Institut für Informatik, CAU Kiel, Germany, 2007.
-
(2007)
Technical Report 0709
-
-
Kürtz, K.O.1
-
8
-
-
84874721799
-
On the decidability of cryptographic protocols with open-ended data structures
-
L. Brim, P. Jancar, M. Kretinsky, and A. Kucera, editors, of Lecture Notes in Computer Science, Springer-Verlag
-
R. Küsters. On the Decidability of Cryptographic Protocols with Open-ended Data Structures. In L. Brim, P. Jancar, M. Kretinsky, and A. Kucera, editors, 13th International Conference on Concurrency Theory (CONCUR 2002), volume 2421 of Lecture Notes in Computer Science, pages 515-530. Springer-Verlag, 2002.
-
(2002)
13th International Conference on Concurrency Theory (CONCUR 2002)
, vol.2421
, pp. 515-530
-
-
Küsters, R.1
-
9
-
-
14844295030
-
On the decidability of cryptographic protocols with open-ended data structures
-
DOI 10.1007/s10207-004-0050-z
-
R. Küsters. On the Decidability of Cryptographic Protocols with Open-ended Data Structures. International Journal of Information Security, 4 (1-2): 49-70, 2005. Online publication appeared 2004. DOI: 10.1007/s10207-004- 0050-z. (Pubitemid 40347201)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 49-70
-
-
Kusters, R.1
-
10
-
-
35048832860
-
Automata-based analysis of recursive cryptographic protocols
-
V. Diekert and M. Habib, editors, of Lecture Notes in Computer Science, Springer-Verlag
-
R. Küsters and T. Wilke. Automata-based Analysis of Recursive Cryptographic Protocols. In V. Diekert and M. Habib, editors, 21st Symposium on Theoretical Aspects of Computer Science (STACS 2004), volume 2996 of Lecture Notes in Computer Science, pages 382-393. Springer-Verlag, 2004.
-
(2004)
21st Symposium on Theoretical Aspects of Computer Science (STACS 2004)
, vol.2996
, pp. 382-393
-
-
Küsters, R.1
Wilke, T.2
-
11
-
-
84961720022
-
Open issues in formal methods for cryptographic protocol analysis
-
IEEE Computer Society Press
-
C. Meadows. Open issues in formal methods for cryptographic protocol analysis. In Proceedings of DISCEX 2000, pages 237-250. IEEE Computer Society Press, 2000.
-
(2000)
Proceedings of DISCEX 2000
, pp. 237-250
-
-
Meadows, C.1
-
13
-
-
0023247970
-
Efficient and timely mutual authentication
-
January
-
D. Otway and O. Rees. Efficient and timely mutual authentication. Operating Systems Review, 21 (1):8-10, January 1987.
-
(1987)
Operating Systems Review
, vol.21
, Issue.1
, pp. 8-10
-
-
Otway, D.1
Rees, O.2
-
14
-
-
35548966087
-
On the automatic analysis of recursive security protocols with XOR
-
W. Thomas and P. Weil, editors, of Lecture Notes in Computer Science. Springer
-
R. Küsters and T. Truderung. On the Automatic Analysis of Recursive Security Protocols with XOR. In W. Thomas and P. Weil, editors, Proceedings of the 24th Symposium on Theoretical Aspects of Computer Science (STACS 2007), volume 4393 of Lecture Notes in Computer Science. Springer, 2007.
-
(2007)
Proceedings of the 24th Symposium on Theoretical Aspects of Computer Science (STACS 2007)
, vol.4393
-
-
Küsters, R.1
Truderung, T.2
-
15
-
-
26944479976
-
Regular protocols and attacks with regular knowledge
-
R. Nieuwenhuis, editor, of Lecture Notes in Computer Science, Springer-Verlag
-
T. Truderung. Regular protocols and attacks with regular knowledge. In R. Nieuwenhuis, editor, Proceedings of the 20th International Conference on Automated Deduction (CADE 2005), volume 3328 of Lecture Notes in Computer Science, pages 377-391. Springer-Verlag, 2005.
-
(2005)
Proceedings of the 20th International Conference on Automated Deduction (CADE 2005)
, vol.3328
, pp. 377-391
-
-
Truderung, T.1
-
16
-
-
27344455431
-
Selecting theories and recursive protocols
-
M. Abadi and L. de Alfaro, editors, of Lecture Notes in Computer Science, Springer-Verlag
-
T. Truderung. Selecting theories and recursive protocols. In M. Abadi and L. de Alfaro, editors, Proceedings of the 16th International Conference on Concurrency Theory (CONCUR 2005), volume 3653 of Lecture Notes in Computer Science, pages 217-232. Springer-Verlag, 2005.
-
(2005)
Proceedings of the 16th International Conference on Concurrency Theory (CONCUR 2005)
, vol.3653
, pp. 217-232
-
-
Truderung, T.1
-
17
-
-
26944478183
-
On the complexity of equational horn clauses
-
of Lecture Notes in Computer Science, Springer-Verlag
-
K. Verma, H. Seidl, and T. Schwentick. On the complexity of equational horn clauses. In Proceedings of the 20th International Conference on Automated Deduction (CADE 2005), volume 3328 of Lecture Notes in Computer Science, pages 337-352. Springer-Verlag, 2005.
-
(2005)
Proceedings of the 20th International Conference on Automated Deduction (CADE 2005)
, vol.3328
, pp. 337-352
-
-
Verma, K.1
Seidl, H.2
Schwentick, T.3
-
18
-
-
0032669524
-
Fixing a security flaw in IKE protocols
-
J. Zhou. Fixing a security flaw in IKE protocols. Electronic Letter, 35 (13):1072-1073, 1999.
-
(1999)
Electronic Letter
, vol.35
, Issue.13
, pp. 1072-1073
-
-
Zhou, J.1
|