-
1
-
-
33750447990
-
Deciding knowledge in security protocols under equational theories
-
DOI 10.1016/j.tcs.2006.08.032, PII S030439750600572X
-
M. Abadi and V. Cortier. Deciding knowledge in security protocols under equational theories. Theoretical Computer Science, 387(1-2):2-32, 2006. (Pubitemid 44649345)
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 2-32
-
-
Abadi, M.1
Cortier, V.2
-
5
-
-
77957559043
-
Analysing unlinkability and anonymity using the applied pi calculus
-
IEEE Computer Society Press
-
M. Arapinis, T. Chothia, E. Ritter, and M. Ryan. Analysing unlinkability and anonymity using the applied pi calculus. In Proc. of 23rd IEEE Computer Security Foundations Symposium (CSF'10), pages 107-121. IEEE Computer Society Press, 2010.
-
(2010)
Proc. of 23rd IEEE Computer Security Foundations Symposium (CSF'10)
, pp. 107-121
-
-
Arapinis, M.1
Chothia, T.2
Ritter, E.3
Ryan, M.4
-
6
-
-
26444497860
-
The AVISPA tool for the automated validation of internet security protocols and applications
-
Computer Aided Verification: 17th International Conference, CAV 2005. Proceedings
-
A. Armando et al. The AVISPA Tool for the automated validation of internet security protocols and applications. In Proc. 17th Int. Conference on Computer Aided Verification (CAV'05), volume 3576 of LNCS, pages 281-285. Springer, 2005. (Pubitemid 41431740)
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, P.H.7
Heam, P.C.8
Kouchnarenko, O.9
Mantovani, J.10
Modersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Vigano, L.16
Vigneron, L.17
-
7
-
-
33745778843
-
Deciding security of protocols against off-line guessing attacks
-
DOI 10.1145/1102120.1102125, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
M. Baudet. Deciding security of protocols against off-line guessing attacks. In Proc. 12th Conference on Computer and Communications Security (CCS'05), pages 16-25. ACM Press, 2005. (Pubitemid 44021986)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 16-25
-
-
Baudet, M.1
-
9
-
-
0034822279
-
An efficient cryptographic protocol verifier based on Prolog rules
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In Proc. 14th Computer Security Foundations Workshop (CSFW'01), pages 82-96. IEEE Comp. Soc. Press, 2001. (Pubitemid 32877779)
-
(2001)
Proceedings of the Computer Security Foundations Workshop
, pp. 82-96
-
-
Blanchet, B.1
-
10
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
DOI 10.1016/j.jlap.2007.06.002, PII S1567832607000549
-
B. Blanchet, M. Abadi, and C. Fournet. Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming, 75(1):3-51, 2008. (Pubitemid 351172997)
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
11
-
-
77955258016
-
Automating security analysis: Symbolic equivalence of constraint systems
-
Springer-Verlag
-
V. Cheval, H. Comon-Lundh, and S. Delaune. Automating security analysis: symbolic equivalence of constraint systems. In Proc. 5th International Joint Conference on Automated Reasoning (IJCAR'10), volume 6173 of LNAI, pages 412-426. Springer-Verlag, 2010.
-
(2010)
Proc. 5th International Joint Conference on Automated Reasoning (IJCAR'10), Volume 6173 of LNAI
, pp. 412-426
-
-
Cheval, V.1
Comon-Lundh, H.2
Delaune, S.3
-
13
-
-
24944569389
-
The finite variant property: How to get rid of some algebraic properties
-
Term Rewriting and Applications: 16th International Conference, RTA 2005, Proceedings
-
H. Comon-Lundh and S. Delaune. The finite variant property: How to get rid of some algebraic properties. In Proc. 16th International Conference on Rewriting Techniques and Applications (RTA'05), LNCS, pages 294-307. Springer, 2005. (Pubitemid 41313364)
-
(2005)
Lecture Notes in Computer Science
, vol.3467
, pp. 294-307
-
-
Comon-Lundh, H.1
Delaune, S.2
-
16
-
-
68249084846
-
Verifying privacy-type properties of electronic voting protocols
-
July
-
S. Delaune, S. Kremer, and M. D. Ryan. Verifying privacy-type properties of electronic voting protocols. Journal of Computer Security, 17(4):435-487, July 2009.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 435-487
-
-
Delaune, S.1
Kremer, S.2
Ryan, M.D.3
-
18
-
-
3042538976
-
Automatic testing equivalence verification of spi calculus specifications
-
DOI 10.1145/941566.941570
-
L. Durante, R. Sisto, and A. Valenzano. Automatic testing equivalence verification of spi calculus specifications. ACM Transactions on Software Engineering and Methodology, 12(2):222-284, 2003. (Pubitemid 44159309)
-
(2003)
ACM Transactions on Software Engineering and Methodology
, vol.12
, Issue.2
, pp. 222-284
-
-
Durante, L.1
Sisto, R.2
Valenzano, A.3
-
22
-
-
77954697164
-
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
-
S. Mödersheim, L. Viganò, and D. A. Basin. Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. Journal of Computer Security, 18(4):575-618, 2010.
-
(2010)
Journal of Computer Security
, vol.18
, Issue.4
, pp. 575-618
-
-
Mödersheim, S.1
Viganò, L.2
Basin, D.A.3
|