-
1
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
DOI 10.1016/j.tcs.2006.08.032, PII S030439750600572X
-
Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2-32 (2006) (Pubitemid 44649345)
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
2
-
-
0035035153
-
Mobile values, new names, and secure communication
-
Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: Proc. of 28th ACM Symposium on Principles of Programming Languages, POPL'01 (2001)
-
Proc. of 28th ACM Symposium on Principles of Programming Languages, POPL'01 (2001)
-
-
Abadi, M.1
Fournet, C.2
-
5
-
-
70350663117
-
YAPA: A generic tool for computing intruder knowledge
-
Treinen, R. (ed.) RTA 2009. Springer, Heidelberg
-
Baudet, M., Cortier, V., Delaune, S.: YAPA: A generic tool for computing intruder knowledge. In: Treinen, R. (ed.) RTA 2009. LNCS, vol. 5595, pp. 148-163. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5595
, pp. 148-163
-
-
Baudet, M.1
Cortier, V.2
Delaune, S.3
-
6
-
-
77957125845
-
An automatic security protocol verifier based on resolution theorem proving
-
invited tutorial. Nieuwenhuis, R. (ed.) CADE 2005. Springer, Heidelberg
-
Blanchet, B.: An automatic security protocol verifier based on resolution theorem proving (invited tutorial). In: Nieuwenhuis, R. (ed.) CADE 2005. LNCS (LNAI), vol. 3632, Springer, Heidelberg (2005)
-
(2005)
LNCS (LNAI)
, vol.3632
-
-
Blanchet, B.1
-
7
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
DOI 10.1016/j.jlap.2007.06.002, PII S1567832607000549
-
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1), 3-51 (2008) (Pubitemid 351172997)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
10
-
-
77955258325
-
-
Ciobâcǎ, Ş.: Kiss (2009), http://www.lsv.ens-cachan. fr/~ciobaca/kiss
-
(2009)
Kiss
-
-
Ciobâcǎ, Ş.1
-
11
-
-
53049101587
-
Challenges in the automated verification of security protocols
-
Armando, A., Baumgartner, P., Dowek, G. (eds.) IJCAR 2008. Springer, Heidelberg
-
Comon-Lundh, H.: Challenges in the automated verification of security protocols. In: Armando, A., Baumgartner, P., Dowek, G. (eds.) IJCAR 2008. LNCS (LNAI), vol. 5195, pp. 396-409. Springer, Heidelberg (2008)
-
(2008)
LNCS (LNAI)
, vol.5195
, pp. 396-409
-
-
Comon-Lundh, H.1
-
12
-
-
76249100283
-
Deciding security properties of cryptographic protocols. application to key cycles
-
Comon-Lundh, H., Cortier, V., Zalinescu, E.: Deciding security properties of cryptographic protocols. application to key cycles. Transaction on Computational Logic 11(2) (2010)
-
Transaction on Computational Logic
, vol.11
, Issue.2
, pp. 2010
-
-
Comon-Lundh, H.1
Cortier, V.2
Zalinescu, E.3
-
13
-
-
13544277438
-
Analysing password protocol security against off-line dictionary attacks
-
Corin, R., Doumen, J., Etalle, S.: Analysing password protocol security against off-line dictionary attacks. Electr. Notes Theor. Comput. Sci. 121, 47-63 (2005)
-
(2005)
Electr. Notes Theor. Comput. Sci.
, vol.121
, pp. 47-63
-
-
Corin, R.1
Doumen, J.2
Etalle, S.3
-
15
-
-
68249084846
-
Verifying privacy-type properties of electronic voting protocols
-
Delaune, S., Kremer, S., Ryan,M.D.: Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security 17(4), 435-487 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 435-487
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
18
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows, C.: The NRL protocol analyzer: An overview. Journal of Logic Programming 26(2), 113-131 (1996)
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
21
-
-
84957640213
-
Towards an automatic analysis of security protocols in first-order logic
-
Ganzinger, H. (ed.) CADE 1999. Springer, Heidelberg
-
Weidenbach, C.: Towards an automatic analysis of security protocols in first-order logic. In: Ganzinger, H. (ed.) CADE 1999. LNCS (LNAI), vol. 1632, pp. 314-328. Springer, Heidelberg (1999)
-
(1999)
LNCS (LNAI)
, vol.1632
, pp. 314-328
-
-
Weidenbach, C.1
|