-
1
-
-
33745790245
-
Guessing attacks and the computational soundness of static equivalence
-
DOI 10.1007/11690634-27, Foundations of Software Science and Computation Structures - 9th International Conf., FOSSACS 2006. Held as Part of the Joint European Conf. on Theory and Practice of Software, ETAPS 2006, Proc.
-
M. Abadi, M. Baudet, and B. Warinschi. Guessing attacks and the computational soundness of static equivalence. In FoSSaCS'06, pages 398-412, 2006. (Pubitemid 44019354)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS3921
, pp. 398-412
-
-
Abadi, M.1
Baudet, M.2
Warinschi, B.3
-
2
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
DOI 10.1016/j.tcs.2006.08.032, PII S030439750600572X
-
M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci., 367(1-2):2-32, 2006. (Pubitemid 44649345)
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
3
-
-
84947720399
-
A bisimulation method for cryptographic protocols
-
M. Abadi and A. D. Gordon. A bisimulation method for cryptographic protocols. Nordic J. of Computing, 5(4), 1998.
-
(1998)
Nordic J. of Computing
, vol.5
, Issue.4
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
85083027758
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
M. Abadi and P. Rogaway. Reconciling two views of cryptography (the computational soundness of formal encryption). J. Cryptology, 15(2):103-127, 2002.
-
(2002)
J. Cryptology
, vol.15
, Issue.2
, pp. 103-127
-
-
Abadi, M.1
Rogaway, P.2
-
5
-
-
85031620050
-
A semantics for a logic of authentication
-
M. Abadi and M. Tuttle. A semantics for a logic of authentication. In PODC'91, pages 201-216, 1991.
-
(1991)
PODC'91
, pp. 201-216
-
-
Abadi, M.1
Tuttle, M.2
-
7
-
-
36349037309
-
On BAN logics for industrial security protocols
-
N. Agray, W. van der Hoek, and E. P. de Vink. On BAN logics for industrial security protocols. In Proc. CEEMAS, pages 29-36, 2001.
-
(2001)
Proc. CEEMAS
, pp. 29-36
-
-
Agray, N.1
Van Der Hoek, W.2
De Vink, E.P.3
-
8
-
-
0025641513
-
A logic of communication in hostile environments
-
IEEE Computer Society Press
-
P. Bieber. A logic of communication in hostile environments. In CSFW III, pages 14-22. IEEE Computer Society Press, 1990.
-
(1990)
CSFW III
, pp. 14-22
-
-
Bieber, P.1
-
9
-
-
47849091109
-
First-order modal logic
-
F. W. Patrick Blackburn, Johan van Benthem, editor Elsevier
-
T. Brauner and S. Ghilardi. First-order modal logic. In F. W. Patrick Blackburn, Johan van Benthem, editor, Handbook of Modal Logic: Volume III. Elsevier, 2006.
-
(2006)
Handbook of Modal Logic
, vol.3
-
-
Brauner, T.1
Ghilardi, S.2
-
10
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. M. Needham. A logic of authentication. ACM Trans. Comput. Syst., 8(1):18-36, 1990.
-
(1990)
ACM Trans. Comput. Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.M.3
-
11
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
12
-
-
60349103014
-
A completeness result for BAN logic
-
M. Cohen and M. Dam. A completeness result for BAN logic. In Proc. M4M'05, pages 202-219, 2005.
-
(2005)
Proc. M4M'05
, pp. 202-219
-
-
Cohen, M.1
Dam, M.2
-
13
-
-
49049083577
-
Logical omniscience in the semantics of BAN logic
-
M. Cohen and M. Dam. Logical omniscience in the semantics of BAN logic. In Proc. FCS'05, pages 121-132, 2005.
-
(2005)
Proc. FCS'05
, pp. 121-132
-
-
Cohen, M.1
Dam, M.2
-
14
-
-
49049103044
-
A complete axiomatization of knowledge and cryptography
-
KTH CSC
-
M. Cohen and M. Dam. A complete axiomatization of knowledge and cryptography. Research report TRITA-CSC-TCS-2007:1, KTH CSC, 2007. http://web.it.kth.se/~mfd/TRITACSCTCS1.pdf.
-
(2007)
Research Report TRITA-CSC-TCS-2007
, vol.1
-
-
Cohen, M.1
Dam, M.2
-
15
-
-
0141751776
-
A compositional logic for proving security properties of protocols
-
N. Durgin, J. Mitchell, and D. Pavlovic. A compositional logic for proving security properties of protocols. J. Comput. Secur., 11(4):677-721, 2004.
-
(2004)
J. Comput. Secur.
, vol.11
, Issue.4
, pp. 677-721
-
-
Durgin, N.1
Mitchell, J.2
Pavlovic, D.3
-
17
-
-
0035035153
-
Mobile values, new names, and secure communication
-
C. Fournet and M. Abadi. Mobile values, new names, and secure communication. In Proc. POPL'01, pages 104-115, 2001.
-
(2001)
Proc. POPL'01
, pp. 104-115
-
-
Fournet, C.1
Abadi, M.2
-
19
-
-
0002399785
-
Quantification in modal logic
-
D. Gabbay and F. Guenthner, editors Reidel
-
J. W. Garson. Quantification in modal logic. In D. Gabbay and F. Guenthner, editors, Handbook of Philosophical Logic: Volume II. Reidel, 1984.
-
(1984)
Handbook of Philosophical Logic
, vol.2
-
-
Garson, J.W.1
-
21
-
-
33646018220
-
Anonymity and information hiding in multiagent systems
-
J. Halpern and K. O'Neill. Anonymity and information hiding in multiagent systems. In Proc. CSFW'03, pages 75-88, 2003.
-
(2003)
Proc. CSFW'03
, pp. 75-88
-
-
Halpern, J.1
O'Neill, K.2
-
22
-
-
84885649872
-
Modeling adversaries in a logic for security protocol analysis
-
J. Y Halpern and R. Pucella. Modeling adversaries in a logic for security protocol analysis. In Proc. FASec, pages 115-132, 2002.
-
(2002)
Proc. FASec
, pp. 115-132
-
-
Halpern, J.Y.1
Pucella, R.2
-
24
-
-
0007616285
-
Counterpart theory and quantified modal logic
-
D. Lewis. Counterpart theory and quantified modal logic. Journal of Philosophy, 65:113-126, 1968.
-
(1968)
Journal of Philosophy
, vol.65
, pp. 113-126
-
-
Lewis, D.1
-
27
-
-
85007180552
-
Distributed processes and the logic of knowledge
-
R. Parikh and R. Ramanujam. Distributed processes and the logic of knowledge. In Logic of Programs, pages 256-268, 1985.
-
(1985)
Logic of Programs
, pp. 256-268
-
-
Parikh, R.1
Ramanujam, R.2
-
30
-
-
4944250729
-
Symbolic model checking the knowledge of the dining cryptographers
-
K. S. Ron van der Meyden. Symbolic model checking the knowledge of the dining cryptographers. In Proc. CSFW'04, 2004.
-
(2004)
Proc. CSFW'04
-
-
Ron Van Der Meyden, K.S.1
-
33
-
-
82755165301
-
Reasoning about cryptographic protocols
-
J. Feigenbaum and M. Merritt, editors
-
M.-J. Toussaint and P. Wolper. Reasoning about cryptographic protocols. In J. Feigenbaum and M. Merritt, editors, Distributed Computing and Cryptography, pages 245-262. 1989.
-
(1989)
Distributed Computing and Cryptography
, pp. 245-262
-
-
Toussaint, M.-J.1
Wolper, P.2
|