-
1
-
-
0001772130
-
Secrecy by typing in security protocols
-
M. Abadi, Secrecy by typing in security protocols, Journal of the ACM 46(5) (1999), 749-786.
-
(1999)
Journal of the ACM
, vol.46
, Issue.5
, pp. 749-786
-
-
Abadi, M.1
-
2
-
-
23144463868
-
Analyzing security protocols with secrecy types and logic programs
-
M. Abadi and B. Blanchet, Analyzing security protocols with secrecy types and logic programs, Journal of the ACM 52(1) (2005), 102-146.
-
(2005)
Journal of the ACM
, vol.52
, Issue.1
, pp. 102-146
-
-
Abadi, M.1
Blanchet, B.2
-
3
-
-
0035035153
-
Mobile values, new names, and secure communication
-
M. Abadi and C. Fournet, Mobile values, new names, and secure communication, SIGPLAN Notices 36(3) (2001), 104-115.
-
(2001)
SIGPLAN notices
, vol.36
, Issue.3
, pp. 104-115
-
-
Abadi, M.1
Fournet, C.2
-
4
-
-
0003092378
-
A calculus for cryptographic protocols
-
M. Abadi and A.D. Gordon, A calculus for cryptographic protocols, Information and Computation 148(1) (1999), 1-70.
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
5
-
-
3142632089
-
Just fast keying: Key agreement in a hostile internet
-
W. Aiello, S.M. Bellovin, M. Blaze, R. Canetti, J. Ioannidis, A.D. Keromytis and O. Reingold, Just fast keying: Key agreement in a hostile Internet, ACM Transactions on Information and System Security 7(2) (2004), 1-30.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.2
, pp. 1-30
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
6
-
-
84874678490
-
On name generation and set-based analysis in the dolev-yao model
-
Brno, Czeck Re-publik, Lecture Notes in Computer Science Springer-Verlag
-
R. Amadio and W. Charatonik, On name generation and set-based analysis in the Dolev-Yao model, in: Proc. 13th International Conference on Concurrency Theory (CONCUR'02), Brno, Czeck Re-publik, Lecture Notes in Computer Science, Vol. 2421, Springer-Verlag, 2002, pp. 499-514.
-
(2002)
Proc. 13th International Conference on Concurrency Theory (CONCUR'02)
, vol.2421
, pp. 499-514
-
-
Amadio, R.1
Charatonik, W.2
-
8
-
-
0009858375
-
Resolution theorem proving
-
J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam
-
L. Bachmair and H. Ganzinger, Resolution theorem proving, in: Handbook of Automated Reasoning, J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam, 2001, pp. 19-99.
-
(2001)
Handbook of Automated Reasoning
, pp. 19-99
-
-
Bachmair, L.1
Ganzinger, H.2
-
9
-
-
0027225011
-
Set constraints are the monadic class
-
Montreal, QC, Canada, IEEE Computer Society Press
-
L. Bachmair, H. Ganzinger and U. Waldmann, Set constraints are the monadic class, in: Proc. 8th Annual IEEE Symposium on Logic in Computer Science (LICS'93), Montreal, QC, Canada, IEEE Computer Society Press, 1993, pp. 75-83.
-
(1993)
Proc. 8th Annual IEEE Symposium on Logic in Computer Science (LICS'93)
, pp. 75-83
-
-
Bachmair, L.1
Ganzinger, H.2
Waldmann, U.3
-
10
-
-
58549114439
-
Computing finite models by reduction to function-free clause logic
-
P. Baumgartner, A. Fuchs, H. de Nivelle and C. Tinelli, Computing finite models by reduction to function-free clause logic, Journal of Applied Logic 7(1) (2009), 58-74.
-
(2009)
Journal of Applied Logic
, vol.7
, Issue.1
, pp. 58-74
-
-
Baumgartner, P.1
Fuchs, A.2
De Nivelle, H.3
Tinelli, C.4
-
11
-
-
0026850091
-
Encrypted key exchange: Password-based protocols secure against dictionary attacks
-
Oakland, CA, May IEEE Computer Society Press, 1992
-
S.M. Bellovin and M. Merritt, Encrypted key exchange: Password-based protocols secure against dictionary attacks, in: Proc. 13th IEEE Symp. Research in Security and Privacy (S&P'93), Oakland, CA, May 1992, IEEE Computer Society Press, 1992, pp. 72-84.
-
(1992)
Proc. 13th IEEE Symp. Research in Security and Privacy (S&P'93)
, pp. 72-84
-
-
Bellovin, S.M.1
Merritt, M.2
-
12
-
-
24344470890
-
-
Texts in Theoretical Computer Science, An EATCS Series Springer-Verlag
-
Y. Bertot and P. Castéran, Interactive Theorem Proving and Program Development Coq'Art: The Calculus of Inductive Constructions, Texts in Theoretical Computer Science, An EATCS Series, Vol. XXV, Springer-Verlag, 2004, pp. 1-469.
-
(2004)
Interactive Theorem Proving and Program Development Coq'Art: The Calculus of Inductive Constructions
, vol.25
, pp. 1-469
-
-
Bertot, Y.1
Castéran, P.2
-
13
-
-
35048821943
-
TulaFale: A security tool for web services
-
K. Bhargavan, C. Fournet, A.D. Gordon and A.R. Pucella, Tulafale: A security tool for web services, in: Proc. 2nd International Symposium on Formal Methods for Components and Objects (FMCO'03), Leiden, The Netherlands, Lecture Notes in Computer Science, Vol. 3188, Springer-Verlag, 2004, pp. 197-222. (Pubitemid 39749529)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3188
, pp. 197-222
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Pucella, R.4
-
14
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Cape Breton, NS, Canada, IEEE Computer Society Press
-
B. Blanchet, An efficient cryptographic protocol verifier based on prolog rules, in: Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01), Cape Breton, NS, Canada, IEEE Computer Society Press, 2001, pp. 82-96.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01)
, pp. 82-96
-
-
Blanchet, B.1
-
15
-
-
77957125845
-
An automatic security protocol verifier based on resolution theorem proving (invited tutorial)
-
Tallinn, Estonia, July R. Nieuwenhuis, ed., LNAI Springer-Verlag, 2005
-
B. Blanchet, An automatic security protocol verifier based on resolution theorem proving (invited tutorial), in: Proc. 20th International Conference on Automated Deduction (CADE-20), Tallinn, Estonia, July 2005, R. Nieuwenhuis, ed., LNAI, Vol. 3632, Springer-Verlag, 2005.
-
(2005)
Proc. 20th International Conference on Automated Deduction (CADE-20)
, vol.3632
-
-
Blanchet, B.1
-
16
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
B. Blanchet, M. Abadi and C. Fournet, Automated verification of selected equivalences for security protocols, Journal of Logic and Algebraic Programming 75(1) (2008), 3-51.
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
17
-
-
0029711237
-
An approach to the formal verification of cryptographic protocols
-
New Delhi, India, March ACM Press, 1996
-
D. Bolignano, An approach to the formal verification of cryptographic protocols, in: Proc. 3rd ACM Conference on Computer and Communications Security (CCS'96), New Delhi, India, March 1996, ACM Press, 1996.
-
(1996)
Proc. 3rd ACM Conference on Computer and Communications Security (CCS'96)
-
-
Bolignano, D.1
-
18
-
-
14044264137
-
The authentication protocol
-
Malvern, UK
-
J. Bull and D.J. Otway, The authentication protocol, Technical Report DRA/CIS3/PROJ/CORBA/ SC/1/CSM/436-04/03, Defence Research Agency, Malvern, UK, 1997.
-
(1997)
Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defence Research Agency
-
-
Bull, J.1
Otway, D.J.2
-
19
-
-
0000523051
-
A logic of authentication
-
M. Burrows, M. Abadi and R. Needham, A logic of authentication, Proceedings of the Royal Society 426(1871) (1989), 233-271.
-
(1989)
Proceedings of the Royal Society
, vol.426
, Issue.1871
, pp. 233-271
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
20
-
-
33750194652
-
Formal analysis of multi-party contract signing
-
R. Chadha, S. Kremer and A. Scedrov, Formal analysis of multi-party contract signing, Journal of Automated Reasoning 36(1,2) (2006), 39-83.
-
(2006)
Journal of Automated Reasoning
, vol.36
, Issue.1-2
, pp. 39-83
-
-
Chadha, R.1
Kremer, S.2
Scedrov, A.3
-
21
-
-
21144453149
-
New techniques that improve MACE-style finite model building
-
P. Baumgartner, ed., Miami, FL, July
-
K. Claessen and N. Sörensson, New techniques that improve MACE-style finite model building, in: Proc. CADE-19 Workshop W4, P. Baumgartner, ed., Miami, FL, July 2003.
-
(2003)
Proc. CADE-19 Workshop W4
-
-
Claessen, K.1
Sörensson, N.2
-
23
-
-
12744255876
-
Negation as failure
-
M.L. Ginsberg, ed., Morgan Kaufmann Publishers, San Francisco, CA
-
K.L. Clark, Negation as failure, in: Readings in Nonmonotonic Reasoning, M.L. Ginsberg, ed., Morgan Kaufmann Publishers, San Francisco, CA, 1987, pp. 311-325.
-
(1987)
Readings in nonmonotonic Reasoning
, pp. 311-325
-
-
Clark, K.L.1
-
24
-
-
4243144450
-
Inductionless induction
-
J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam
-
H. Comon, Inductionless induction, in: Handbook of Automated Reasoning, J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam, 2001, pp. 913-962.
-
(2001)
Handbook of Automated Reasoning
, pp. 913-962
-
-
Comon, H.1
-
25
-
-
0004060205
-
-
available at (version of September 6, 2005)
-
H. Comon, M. Dauchet, R. Gilleron, F. Jacquemard, D. Lugiez, S. Tison and M. Tommasi, Tree automata techniques and applications, 1997, available at: www.grappa.univ-lille3.fr/tata (version of September 6, 2005).
-
(1997)
Tree Automata Techniques and Applications
-
-
Comon, H.1
Dauchet, M.2
Gilleron, R.3
Jacquemard, F.4
Lugiez, D.5
Tison, S.6
Tommasi, M.7
-
26
-
-
0034713209
-
Induction = i-axiomatization + first-order consistency
-
H. Comon and R. Nieuwenhuis, Induction = i-axiomatization + first-order consistency, Information and Computation 159(1,2) (2000), 151-186.
-
(2000)
Information and Computation
, vol.159
, Issue.1-2
, pp. 151-186
-
-
Comon, H.1
Nieuwenhuis, R.2
-
28
-
-
13544254153
-
Guess what? Here is a new tool that finds some new guessing attacks
-
R. Gorrieri and R. Lucchi, eds, Warsaw, Poland, April
-
R. Corin, S. Malladi, J. Alves-Foss and S. Etalle, Guess what? Here is a new tool that finds some new guessing attacks, in: Proc. IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS'03), R. Gorrieri and R. Lucchi, eds, Warsaw, Poland, April 2003, pp. 62-71.
-
(2003)
Proc. IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS'03)
, pp. 62-71
-
-
Corin, R.1
Malladi, S.2
Alves-Foss, J.3
Etalle, S.4
-
29
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
V. Cortier, S. Delaune and P. Lafourcade, A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security 14(1) (2006), 1-43.
-
(2006)
Journal of Computer Security
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
30
-
-
35048847541
-
A formal theory of key conjuring
-
Venice, Italy, July IEEE Computer Society Press
-
V. Cortier, S. Delaune and G. Steel, A formal theory of key conjuring, in: Proc. 20th IEEE Computer Security Foundations Symposium (CSF'07), Venice, Italy, July 2007, IEEE Computer Society Press, 1997, pp. 79-93.
-
(1997)
Proc. 20th IEEE Computer Security Foundations Symposium (CSF'07)
, pp. 79-93
-
-
Cortier, V.1
Delaune, S.2
Steel, G.3
-
31
-
-
51749115651
-
Relating two standard notions of secrecy
-
V. Cortier, M. Rusinowitch and E. Zǎlinescu, Relating two standard notions of secrecy, Logical Methods in Computer Science 3(2,3) (2007), 1-29.
-
(2007)
Logical Methods in Computer Science
, vol.3
, Issue.2-3
, pp. 1-29
-
-
Cortier, V.1
Rusinowitch, M.2
Zǎlinescu, E.3
-
32
-
-
38049033340
-
Model-checking first-order logic: Automata and locality
-
J. Duparc and T.A. Henzinger, eds, Lausanne, Switzerland, September Lecture Notes in Computer Science Springer-Verlag, 2007
-
A. Dawar, Model-checking first-order logic: Automata and locality, in: Proc. 21st International Workshop on Computer Science Logic, 16th Annual Conference of the EACSL (CSL'07), J. Duparc and T.A. Henzinger, eds, Lausanne, Switzerland, September 2007, Lecture Notes in Computer Science, Vol. 4646, Springer-Verlag, 2007, p. 6.
-
(2007)
Proc. 21st International Workshop on Computer Science Logic, 16th Annual Conference of the EACSL (CSL'07)
, vol.4646
, pp. 6
-
-
Dawar, A.1
-
33
-
-
84976665942
-
Timestamps in key distribution protocols
-
D.E. Denning and G.M. Sacco, Timestamps in key distribution protocols, Communications of the ACM 24(8) (1981), 533-536.
-
(1981)
Communications of the ACM
, vol.24
, Issue.8
, pp. 533-536
-
-
Denning, D.E.1
Sacco, G.M.2
-
34
-
-
0030170118
-
Smallest horn clause programs
-
P. Devienne, P. Lebègue, A. Parrain, J.-C. Routier and J. Würtz, Smallest Horn clause programs, Journal of Logic Programming 27(3) (1994), 227-267.
-
(1994)
Journal of Logic Programming
, vol.27
, Issue.3
, pp. 227-267
-
-
Devienne, P.1
Lebègue, P.2
Parrain, A.3
Routier, J.-C.4
Würtz, J.5
-
37
-
-
3042529055
-
Undecidability of bounded security protocols
-
N. Heintze and E. Clarke, eds, Trento, Italy, July
-
N. Durgin, P. Lincoln, J. Mitchell and A. Scedrov, Undecidability of bounded security protocols. in: Proc. Workshop on Formal Methods and Security Protocols (FMSP'99), N. Heintze and E. Clarke, eds, Trento, Italy, July 1999.
-
(1999)
Proc. Workshop on Formal Methods and Security Protocols (FMSP'99)
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
38
-
-
0026188229
-
Logic programs as types for logic programs
-
Amsterdam, The Netherlands, IEEE Computer Society Press
-
T. Frühwirth, E. Shapiro, M.Y. Vardi and E. Yardeni, Logic programs as types for logic programs, in: Proc. 6th Annual IEEE Symposium Logic in Computer Science (LICS'91), Amsterdam, The Netherlands, IEEE Computer Society Press, 1991, pp. 300-309.
-
(1991)
Proc. 6th Annual IEEE Symposium Logic in Computer Science (LICS'91)
, pp. 300-309
-
-
Frühwirth, T.1
Shapiro, E.2
Vardi, M.Y.3
Yardeni, E.4
-
39
-
-
0002783180
-
Using one-way functions for authentication
-
L. Gong, Using one-way functions for authentication, Computer Communication Review 19(5) (1989), 8-11.
-
(1989)
Computer Communication Review
, vol.19
, Issue.5
, pp. 8-11
-
-
Gong, L.1
-
40
-
-
77957138523
-
-
LSV, ENS Cachan, CNRS, INRIA project SECSI available at
-
J. Goubault-Larrecq, The h1 Tool Suite, LSV, ENS Cachan, CNRS, INRIA project SECSI, 2003, available at: http://www.lsv.ens-cachan.fr/ goubault/H1.dist/dh1index.html.
-
(2003)
The H1 Tool Suite
-
-
Goubault-Larrecq, J.1
-
41
-
-
20144382303
-
Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve?
-
V. Ménissier-Morain, ed., INRIA, Sainte-Marie-de-Ré, France, January (invited paper)
-
J. Goubault-Larrecq, Une fois qu'on n'a pas trouvé de preuve, comment le faire comprendre à un assistant de preuve?, in: Actes des 15èmes Journées Francophones sur les Langages Applicatifs (JFLA'04), V. Ménissier-Morain, ed., INRIA, Sainte-Marie-de-Ré, France, January 2004, pp. 1-40 (invited paper).
-
(2004)
Actes des 15èmes Journées Francophones sur les Langages Applicatifs (JFLA'04)
, pp. 1-40
-
-
Goubault-Larrecq, J.1
-
43
-
-
51749115322
-
Towards producing formally checkable security proofs, automatically
-
Pittsburg, PA, USA, IEEE Computer Society Press
-
J. Goubault-Larrecq, Towards producing formally checkable security proofs, automatically, in: Proc. 21st IEEE Computer Security Foundations Symposium (CSF'08), Pittsburg, PA, USA, IEEE Computer Society Press, 2008, pp. 224-238.
-
(2008)
Proc. 21st IEEE Computer Security Foundations Symposium (CSF'08)
, pp. 224-238
-
-
Goubault-Larrecq, J.1
-
44
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
Paris, France, January R. Cousot, ed., Lecture Notes in Computer Science Springer-Verlag, 2005
-
J. Goubault-Larrecq and F. Parrennes, Cryptographic protocol analysis on real C code, in: Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05), Paris, France, January 2005, R. Cousot, ed., Lecture Notes in Computer Science, Vol. 3385, Springer-Verlag, 2005, pp. 363-379.
-
(2005)
Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation (VMCAI'05)
, vol.3385
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
45
-
-
20144373910
-
Abstraction and resolution modulo AC: How to verify diffie-hellman-like protocols automatically
-
J. Goubault-Larrecq, M. Roger and K.N. Verma, Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically, Journal of Logic and Algebraic Programming 64(2) (2005), 219-251.
-
(2005)
Journal of Logic and Algebraic Programming
, vol.64
, Issue.2
, pp. 219-251
-
-
Goubault-Larrecq, J.1
Roger, M.2
Verma, K.N.3
-
47
-
-
84947422974
-
A simple model for quotient types
-
Edinburgh, UK, April M. Dezani-Ciancaglini and G.D. Plotkin, eds, Lecture Notes in Computer Science Springer-Verlag
-
M. Hofmann, A simple model for quotient types, in: Proc. 2nd Intl. Conf. Typed Lambda Calculi and Applications (TLCA'95), Edinburgh, UK, April 1995, M. Dezani-Ciancaglini and G.D. Plotkin, eds, Lecture Notes in Computer Science, Vol. 902, Springer-Verlag, pp. 216-234.
-
(1995)
Proc. 2nd Intl. Conf. Typed Lambda Calculi and Applications (TLCA'95)
, vol.902
, pp. 216-234
-
-
Hofmann, M.1
-
48
-
-
33750159684
-
Quotient types
-
R.J. Boulton and P.B. Jackson, eds, Number EDI-INF-RR-0046 in Informatics Report Series, Division of Informatics, University of Edinburgh, September available at
-
P.V. Homeier, Quotient types, in: Supplemental Proceedings, 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'01), R.J. Boulton and P.B. Jackson, eds, Number EDI-INF-RR-0046 in Informatics Report Series, Division of Informatics, University of Edinburgh, September 2001, pp. 191-206, available at: http://www.inf.ed.ac.uk/publications/report/0046.html.
-
(2001)
Supplemental Proceedings, 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'01)
, pp. 191-206
-
-
Homeier, P.V.1
-
51
-
-
34548154019
-
Relating the symbolic and computational models of security protocols using hashes
-
P. Degano, R. Küsters, L. Viganò and S. Zdancewic, eds, Seattle, Washington, USA, August available at
-
R. Janvier, Y. Lakhnech and L. Mazaré, Relating the symbolic and computational models of security protocols using hashes, in: Proc. Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06), P. Degano, R. Küsters, L. Viganò and S. Zdancewic, eds, Seattle, Washington, USA, August 2006, pp. 67-89, available at: http://www.easychair.org/FLoC-06/fcs-arspa06.pdf.
-
(2006)
Proc. Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06)
, pp. 67-89
-
-
Janvier, R.1
Lakhnech, Y.2
Mazaré, L.3
-
52
-
-
0038824488
-
An efficient and secure authentication protocol using uncertified keys
-
I.L.K. Kao and R. Chow, An efficient and secure authentication protocol using uncertified keys, Operating Systems Review 29(3) (1995), 14-21.
-
(1995)
Operating Systems Review
, vol.29
, Issue.3
, pp. 14-21
-
-
Kao, I.L.K.1
Chow, R.2
-
55
-
-
85018066264
-
SKEME: A versatile secure key exchange mechanism for internet
-
San Diego, CA, USA, IEEE Computer Society Press
-
H. Krawczyk, SKEME: A versatile secure key exchange mechanism for Internet, in: Proc. 4th Internet Society Symposium on Network and Distributed Systems Security (SNDSS'96), San Diego, CA, USA, IEEE Computer Society Press, 1996, pp. 114-127.
-
(1996)
Proc. 4th Internet Society Symposium on Network and Distributed Systems Security (SNDSS'96)
, pp. 114-127
-
-
Krawczyk, H.1
-
56
-
-
41549153251
-
Computational soundness of equational theories (tutorial)
-
Sophia-Antipolis, France, G. Barthe and C. Fournet, eds, Lecture Notes in Computer Science Springer-Verlag
-
S. Kremer, Computational soundness of equational theories (tutorial), in: Proc. 3rd Symposium on Trustworthy Global Computing (TGC'07), Sophia-Antipolis, France, G. Barthe and C. Fournet, eds, Lecture Notes in Computer Science, Vol. 4912, Springer-Verlag, 2008, pp. 363-382.
-
(2008)
Proc. 3rd Symposium on Trustworthy Global Computing (TGC'07)
, vol.4912
, pp. 363-382
-
-
Kremer, S.1
-
57
-
-
35548966087
-
On the automatic analysis of recursive security protocols with XOR
-
Aachen, Germany, W. Thomas and P. Weil, eds, Lecture Notes in Computer Science Springer-Verlag
-
R. Küsters and T. Trudering, On the automatic analysis of recursive security protocols with XOR, in: Proc. 24th Symposium on Theoretical Aspects of Computer Science (STACS'2007), Aachen, Germany, W. Thomas and P. Weil, eds, Lecture Notes in Computer Science, Vol. 4393, Springer-Verlag, 2007, pp. 646-657.
-
(2007)
Proc. 24th Symposium on Theoretical Aspects of Computer Science (STACS'2007)
, vol.4393
, pp. 646-657
-
-
Küsters, R.1
Trudering, T.2
-
58
-
-
33750022021
-
A simple explanation of inductionless induction
-
Louisiana State University
-
D.S. Lankford, A simple explanation of inductionless induction, Technical Report MTP-14, Math. Dept., Louisiana State University, 1981.
-
(1981)
Technical Report MTP-14, Math. Dept.
-
-
Lankford, D.S.1
-
59
-
-
28144456308
-
An attack on the needham-schroeder public-key authentication protocol
-
G. Lowe, An attack on the Needham-Schroeder public-key authentication protocol, Information Processing Letters 56(3) (1996), 131-133.
-
(1996)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
61
-
-
30244556588
-
Undecidability of the horn clause implication problem
-
IEEE Computer Society Press, Pittsburgh, PA
-
J. Marcinkowski and L. Pacholski, Undecidability of the Horn clause implication problem. in: Proc. 33rd Annual Symposium on Foundations of Computer Science (FOCS'92), IEEE Computer Society Press, Pittsburgh, PA, 1992, pp. 354-362.
-
(1992)
Proc. 33rd Annual Symposium on Foundations of Computer Science (FOCS'92)
, pp. 354-362
-
-
Marcinkowski, J.1
Pacholski, L.2
-
64
-
-
35048899313
-
Soundness of formal encryption in the presence of active adversaries
-
Cambridge, MA, February M. Naor, ed., Lecture Notes in Computer Science Springer-Verlag, 2004
-
D. Micciancio and B. Warinschi, Soundness of formal encryption in the presence of active adversaries, in: Proc. 1st IACR Theory of Cryptography Conference (TCC'04), Cambridge, MA, February 2004, M. Naor, ed., Lecture Notes in Computer Science, Vol. 2951, Springer-Verlag, 2004, pp. 133-151.
-
(2004)
Proc. 1st IACR Theory of Cryptography Conference (TCC'04)
, vol.2951
, pp. 133-151
-
-
Micciancio, D.1
Warinschi, B.2
-
65
-
-
84957716708
-
Abstracting cryptographic protocols with tree automata
-
Venecia, Italy, Lecture Notes in Computer Science Springer-Verlag
-
D. Monniaux, Abstracting cryptographic protocols with tree automata, in: Proc. 6th International Static Analysis Symposium (SAS'99), Venecia, Italy, Lecture Notes in Computer Science, Vol. 1694, Springer-Verlag, 1999, pp. 149-163.
-
(1999)
Proc. 6th International Static Analysis Symposium (SAS'99)
, vol.1694
, pp. 149-163
-
-
Monniaux, D.1
-
66
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R.M. Needham and M.D. Schroeder, Using encryption for authentication in large networks of computers, Communications of the ACM 21(12) (1978), 993-999.
-
(1978)
Communications of the ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
68
-
-
84958766164
-
Normalizable horn clauses, strongly recognizable relations and spi
-
Madrid, Spain, Lecture Notes in Computer Science Springer-Verlag
-
F. Nielson, H.R. Nielson and H. Seidl, Normalizable Horn clauses, strongly recognizable relations and Spi, in: Proc. 9th International Static Analysis Symposium (SAS'02), Madrid, Spain, Lecture Notes in Computer Science, Vol. 2477, Springer-Verlag, 2002, pp. 20-35.
-
(2002)
Proc. 9th International Static Analysis Symposium (SAS'02)
, vol.2477
, pp. 20-35
-
-
Nielson, F.1
Nielson, H.R.2
Seidl, H.3
-
70
-
-
0002089129
-
Isabelle: The next 700 theorem provers
-
P. Odifreddi, ed., The APIC Series Academic Press
-
L.C. Paulson, Isabelle: The next 700 theorem provers, in: Logic and Computer Science, P. Odifreddi, ed., The APIC Series, Vol. 31, Academic Press, 1990, pp. 361-386.
-
(1990)
Logic and Computer Science
, vol.31
, pp. 361-386
-
-
Paulson, L.C.1
-
71
-
-
0030705795
-
Proving properties of security protocols by induction
-
IEEE Computer Society Press, Rockport, MA
-
L.C. Paulson, Proving properties of security protocols by induction, in: Proc. 10th IEEE Computer Security Foundations Workshop (CSFW'97), IEEE Computer Society Press, Rockport, MA, 1997, pp. 70-83.
-
(1997)
Proc. 10th IEEE Computer Security Foundations Workshop (CSFW'97)
, pp. 70-83
-
-
Paulson, L.C.1
-
72
-
-
0034950756
-
Relations between secrets: Two formal analyses of the yahalom protocol
-
L.C. Paulson, Relations between secrets: Two formal analyses of the Yahalom protocol, Journal of Computer Security 9(3) (2001), 197-216.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.3
, pp. 197-216
-
-
Paulson, L.C.1
-
73
-
-
0034822650
-
A security analysis of the cliques protocols suites
-
Cape Breton, NS, Canada, IEEE Computer Society Press
-
O. Pereira and J.-J. Quisquater, A security analysis of the cliques protocols suites, in: Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01), Cape Breton, NS, Canada, IEEE Computer Society Press, 2001, pp. 73-81.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW'01)
, pp. 73-81
-
-
Pereira, O.1
Quisquater, J.-J.2
-
74
-
-
84884627542
-
Experiments with finite tree automata in coq
-
Edinburgh, Scotland, UK, September R.J. Boulton and P.B. Jackson, eds, Lecture Notes in Computer Science Springer-Verlag, 2001
-
X. Rival and J. Goubault-Larrecq, Experiments with finite tree automata in Coq, in: Proc. 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'01), Edinburgh, Scotland, UK, September 2001, R.J. Boulton and P.B. Jackson, eds, Lecture Notes in Computer Science, Vol. 2152, Springer-Verlag, 2001, pp. 362-377.
-
(2001)
Proc. 14th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'01)
, vol.2152
, pp. 362-377
-
-
Rival, X.1
Goubault-Larrecq, J.2
-
75
-
-
0003753345
-
-
J.A. Robinson and A. Voronkov (eds) North-Holland, Amsterdam
-
J.A. Robinson and A. Voronkov (eds), Handbook of Automated Reasoning, North-Holland, Amsterdam, 2001.
-
(2001)
Handbook of Automated Reasoning
-
-
-
76
-
-
0002219322
-
An attack on a recursive authentication protocol: A cautionary tale
-
P.Y.A. Ryan and S.A. Schneider, An attack on a recursive authentication protocol: A cautionary tale, Information Processing Letters 65(1) (1998), 7-10.
-
(1998)
Information Processing Letters
, vol.65
, Issue.1
, pp. 7-10
-
-
Ryan, P.Y.A.1
Schneider, S.A.2
-
79
-
-
33947656534
-
Cryptographically sound theorem proving
-
IEEE Computer Society Press, Washington, DC, USA
-
C. Sprenger, M. Backes, D. Basin, B. Pfitzmann and M. Waidner, Cryptographically sound theorem proving, in: Proc. 19th IEEE Computer Security Foundations Symposium Workshop (CSFW'06), IEEE Computer Society Press, Washington, DC, USA, 2006, pp. 153-166.
-
(2006)
Proc. 19th IEEE Computer Security Foundations Symposium Workshop (CSFW'06)
, pp. 153-166
-
-
Sprenger, C.1
Backes, M.2
Basin, D.3
Pfitzmann, B.4
Waidner, M.5
-
80
-
-
0034247455
-
Key agreement in dynamic peer groups
-
M. Steiner, G. Tsudik and M. Waidner, Key agreement in dynamic peer groups, IEEE Transactions on Parallel and Distributed Systems 11(8) (2000), 769-780.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
82
-
-
0033344295
-
Strand spaces: Proving security protocols correct
-
F.J. Thayer Fábrega, J.C. Herzog and J.D. Guttman, Strand spaces: Proving security protocols correct, Journal of Computer Security 7(2,3) (1999), 191-230.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.2-3
, pp. 191-230
-
-
Thayer Fábrega, F.J.1
Herzog, J.C.2
Guttman, J.D.3
-
83
-
-
0001592091
-
Towards an automatic analysis of security protocols
-
Trento, Italy, July H. Ganzinger, ed., LNAI Springer-Verlag, 1999
-
C. Weidenbach, Towards an automatic analysis of security protocols, in: Proc. 16th International Conference on Automated Deduction (CADE-16), Trento, Italy, July 1999, H. Ganzinger, ed., LNAI, Vol. 1632, Springer-Verlag, 1999, pp. 378-382.
-
(1999)
Proc. 16th International Conference on Automated Deduction (CADE-16)
, vol.1632
, pp. 378-382
-
-
Weidenbach, C.1
-
84
-
-
15544363314
-
Combining superposition, sorts and splitting
-
J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam
-
C. Weidenbach, Combining superposition, sorts and splitting, in: Handbook of Automated Reasoning, J.A. Robinson and A. Voronkov, eds, North-Holland, Amsterdam, 2001, pp. 1965-2013.
-
(2001)
Handbook of Automated Reasoning
, pp. 1965-2013
-
-
Weidenbach, C.1
-
85
-
-
70350690461
-
SPASS version 2.0
-
Copenhagen, Denmark, A. Voronkov, ed., LNAI Springer-Verlag
-
C. Weidenbach, U. Brahm, T. Hillenbrand, E. Keen, C. Theobald and D. Topić, SPASS version 2.0, in: Proc. 18th International Conference on Automated Deduction (CADE'02), Copenhagen, Denmark, A. Voronkov, ed., LNAI, Vol. 2392, Springer-Verlag, 2002, pp. 275-279.
-
(2002)
Proc. 18th International Conference on Automated Deduction (CADE'02)
, vol.2392
, pp. 275-279
-
-
Weidenbach, C.1
Brahm, U.2
Hillenbrand, T.3
Keen, E.4
Theobald, C.5
Topić, D.6
-
86
-
-
77957140789
-
-
Part of the guide for authors of TPHOL conferences (theorem proving in higher-order logics) since 1999 available at
-
Writing for the TPHOLs community, Part of the guide for authors of TPHOL conferences (theorem proving in higher-order logics) since 1999, 1999, available at: http://www-sop.inria.fr/croap/ TPHOLs99/authors.html.
-
(1999)
Writing for the TPHOLs Community
-
-
|