-
1
-
-
28144456308
-
An attack on the Needham-Schroeder public key authentication protocol
-
G. Lowe, An attack on the Needham-Schroeder public key authentication protocol, Information Processing Letters 56(3) (1995) 131-133.
-
(1995)
Information Processing Letters
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
4
-
-
85031206101
-
-
Available at
-
AVISPA Project, Avispa protocol library, 2003. Available at http://www.avispa-project.org/.
-
(2003)
Avispa Protocol Library
-
-
-
5
-
-
0003092378
-
A calculus for cryptographic protocols: The spi calculus
-
M. Abadi, A. D. Gordon, A calculus for cryptographic protocols: the spi calculus, Information and Computation 148(1) (1999) 1-70. (Pubitemid 129608821)
-
(1999)
Information and Computation
, vol.148
, Issue.1
, pp. 1-70
-
-
Abadi, M.1
Gordon, A.D.2
-
6
-
-
84879078812
-
Reconciling two views of cryptography (the computational soundness of formal encryption)
-
Springer-Verlag
-
M. Abadi, P. Rogaway, Reconciling two views of cryptography (the computational soundness of formal encryption), in: Proceedings of the 1st IFIP International Conference on Theoretical Computer Science (IFIP-TCS), Lecture Notes in Computer Science, vol. 1872, Springer-Verlag, 2000, pp. 3-22.
-
(2000)
Proceedings of the 1st IFIP International Conference on Theoretical Computer Science (IFIP-TCS), Lecture Notes in Computer Science
, vol.1872
, pp. 3-22
-
-
Abadi, M.1
Rogaway, P.2
-
7
-
-
0020720357
-
On the security of public-key protocols
-
IEEE Computer Society Press
-
D. Dolev, A. Yao, On the security of public-key protocols, in: Transactions on Information Theory, vol. 29, IEEE Computer Society Press, 1983, pp. 198-208.
-
(1983)
Transactions on Information Theory
, vol.29
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
8
-
-
31744441853
-
A survey of algebraic properties used in cryptographic protocols
-
V. Cortier, S. Delaune, P. Lafourcade, A survey of algebraic properties used in cryptographic protocols, Journal of Computer Security 14(1) (2006) 1-43. (Pubitemid 43177436)
-
(2006)
Journal of Computer Security
, vol.14
, Issue.1
, pp. 1-43
-
-
Cortier, V.1
Delaune, S.2
Lafourcade, P.3
-
10
-
-
0002783180
-
Using one-way functions for authentication
-
L. Gong, Using one-way functions for authentication, SIGCOMM Computer Communication 19(5) (1989) 8-11.
-
(1989)
SIGCOMM Computer Communication
, vol.19
, Issue.5
, pp. 8-11
-
-
Gong, L.1
-
12
-
-
0042467908
-
Intruder deductions, constraint solving and insecurity decision in presence of exclusive or
-
IEEE Comp. Soc. Press, Ottawa Canada
-
H. Comon-Lundh, V. Shmatikov, Intruder deductions, constraint solving and insecurity decision in presence of exclusive or, in: Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), IEEE Comp. Soc. Press, Ottawa (Canada), 2003, pp. 271-280.
-
(2003)
Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03)
, pp. 271-280
-
-
Comon-Lundh, H.1
Shmatikov, V.2
-
13
-
-
0041967380
-
An NP decision procedure for protocol insecurity with XOR
-
IEEE Comp. Soc. Press, Ottawa Canada
-
Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, An NP decision procedure for protocol insecurity with XOR, in: Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), IEEE Comp. Soc. Press, Ottawa (Canada), 2003, pp. 261-270.
-
(2003)
Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03)
, pp. 261-270
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
14
-
-
70349714960
-
Symbolic protocol analysis with products and Diffie-Hellman exponentiation
-
IEEE Comp. Soc. Press, Pacific Grove California, USA
-
J. Millen, V. Shmatikov, Symbolic protocol analysis with products and Diffie-Hellman exponentiation, in: Proceedings of the 16th Computer Security Foundation Workshop (CSFW'03), IEEE Comp. Soc. Press, Pacific Grove (California, USA), 2003, pp. 47-62.
-
(2003)
Proceedings of the 16th Computer Security Foundation Workshop (CSFW'03)
, pp. 47-62
-
-
Millen, J.1
Shmatikov, V.2
-
15
-
-
35248865266
-
Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents
-
P. K. Pandya, J. Radhakrishnan Eds., Springer
-
Y. Chevalier, R. Küsters, M. Rusinowitch, M. Turuani, Deciding the security of protocols with Diffie-Hellman exponentiation and products in exponents, in: P. K. Pandya, J. Radhakrishnan (Eds.), FSTTCS, Lecture Notes in Computer Science, vol. 2914, Springer, 2003, pp. 124-135.
-
(2003)
FSTTCS, Lecture Notes in Computer Science
, vol.2914
, pp. 124-135
-
-
Chevalier, Y.1
Küsters, R.2
Rusinowitch, M.3
Turuani, M.4
-
16
-
-
35248836596
-
Easy intruder deductions
-
Verification: Theory and Practice (Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday)
-
H. Comon-Lundh, R. Treinen, Easy intruder deductions, in: N. Dershowitz (Ed.), Verification: Theory and Practice, Essays Dedicated to Zohar Manna on the Occasion of His 64th Birthday, Lecture Notes in Computer Science, vol. 2772, Springer-Verlag, 2003, pp. 225-242. (Pubitemid 38318527)
-
(2003)
Lecture Notes in Computer Science
, Issue.2772
, pp. 225-242
-
-
Comon-Lundh, H.1
Treinen, R.2
-
17
-
-
31344437591
-
Easy intruder deduction problems with homomorphisms
-
DOI 10.1016/j.ipl.2005.11.008, PII S0020019005003248
-
S. Delaune, Easy intruder deduction problems with homomorphisms, Information Processing Letters 97(6) (2006) 213-218. (Pubitemid 43144825)
-
(2006)
Information Processing Letters
, vol.97
, Issue.6
, pp. 213-218
-
-
Delaune, S.1
-
18
-
-
33746409663
-
Symbolic protocol analysis in presence of a homomorphism operator and exclusive or
-
Springer, Venice, Italy
-
S. Delaune, P. Lafourcade, D. Lugiez, R. Treinen, Symbolic protocol analysis in presence of a homomorphism operator and exclusive or, in: Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06), Lecture Notes in Computer Science, vol. 4052, Springer, Venice, Italy, 2006, pp. 132-141.
-
(2006)
Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP'06), Lecture Notes in Computer Science
, vol.4052
, pp. 132-141
-
-
Delaune, S.1
Lafourcade, P.2
Lugiez, D.3
Treinen, R.4
-
20
-
-
33745778843
-
Deciding security of protocols against off-line guessing attacks
-
DOI 10.1145/1102120.1102125, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security
-
M. Baudet, Deciding security of protocols against off-line guessing attacks, in: Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), ACM Press, Alexandria, Virginia, USA, 2005, pp. 16-25. (Pubitemid 44021986)
-
(2005)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 16-25
-
-
Baudet, M.1
-
21
-
-
14844335720
-
A decision procedure for the verification of security protocols with explicit destructors
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
S. Delaune, F. Jacquemard, A decision procedure for the verification of security protocols with explicit destructors, in: V. Atluri, B. Pfitzmann, P. McDaniel (Eds.), Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04), ACM Press, Washington, DC, USA, 2004, pp. 278-287. (Pubitemid 40338209)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 278-287
-
-
Delaune, S.1
Jacquemard, E.2
-
22
-
-
35048822401
-
Deciding knowledge in security protocols under equational theories
-
Springer-Verlag, Turku Finland
-
M. Abadi, V. Cortier, Deciding knowledge in security protocols under equational theories, in: Proceedings of 31st International Colloquium on Automata, Languages, and Programming (ICALP'04), Lecture Notes in Computer Science, vol. 3142, Springer-Verlag, Turku (Finland), 2004, pp. 46-58.
-
(2004)
Proceedings of 31st International Colloquium on Automata, Languages, and Programming (ICALP'04), Lecture Notes in Computer Science
, vol.3142
, pp. 46-58
-
-
Abadi, M.1
Cortier, V.2
-
23
-
-
28144451656
-
Deciding knowledge in security protocols under (many more) equational theories
-
Proceedings of the 18th IEEE Computer Security Foundations Workshop
-
M. Abadi, V. Cortier, Deciding knowledge in security protocols under (many more) equational theories, in: CSFW'05: Proceedings of the 18th IEEE Computer Security Foundations Workshop (CSFW'05), IEEE Computer Society, Washington, DC, USA, 2005, pp. 62-76. (Pubitemid 41696421)
-
(2005)
Proceedings of the Computer Security Foundations Workshop
, pp. 62-76
-
-
Abadi, M.1
Cortier, V.2
-
24
-
-
26444458330
-
Combining intruder theories
-
Automata, Languages and Programming: 32nd International Colloquium, ICALP 2005. Proceedings
-
Y. Chevalier, M. Rusinowitch, Combining intruder theories, in: L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, M. Yung (Eds.), ICALP, Lecture Notes in Computer Science, vol. 3580, Springer, 2005, pp. 639-651. (Pubitemid 41436135)
-
(2005)
Lecture Notes in Computer Science
, vol.3580
, pp. 639-651
-
-
Chevalier, Y.1
Rusinowitch, M.2
-
25
-
-
35048861399
-
Intruder theories (ongoing work)
-
LNCS, Springer-Verlag, Barcelona Spain
-
H. Comon-Lundh, Intruder theories (ongoing work), in: Proceedings of the 7th International Conferenceon Foundations of Software Science and Computation Structures (FOSSACS'04), LNCS, vol. 987, Springer-Verlag, Barcelona (Spain), 2004, pp. 1-4.
-
(2004)
Proceedings of the 7th International Conferenceon Foundations of Software Science and Computation Structures (FOSSACS'04)
, vol.987
, pp. 1-4
-
-
Comon-Lundh, H.1
-
26
-
-
3042529055
-
Undecidability of bounded security protocols
-
Trento Italy
-
N. Durgin, P. Lincoln, J. Mitchell, A. Scedrov, Undecidability of bounded security protocols, in: Proceedings of the Workshop on Formal Methods and Security Protocols (FMSP'99), Trento (Italy), 1999.
-
(1999)
Proceedings of the Workshop on Formal Methods and Security Protocols (FMSP'99)
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
28
-
-
84969340391
-
Key distribution protocol for digital mobile communication systems
-
LNCS, Springer-Verlag, Santa Barbara California, USA
-
M. Tatebayashi, N. Matsuzaki, D. B. Newman, Key distribution protocol for digital mobile communication systems, in: Proceedings of the 9th Annual International Cryptology Conference (CRYPTO'89), LNCS, vol. 435, Springer-Verlag, Santa Barbara (California, USA), 1989, pp. 324-333.
-
(1989)
Proceedings of the 9th Annual International Cryptology Conference (CRYPTO'89)
, vol.435
, pp. 324-333
-
-
Tatebayashi, M.1
Matsuzaki, N.2
Newman, D.B.3
-
30
-
-
19744367735
-
Luca Viganó, Ofmc: A symbolic model checker for security protocols
-
published online December
-
D. Basin, S. Mödersheim, Luca Viganó, Ofmc:a symbolic model checker for security protocols, International Journal of Information Security 4(3) (2005) 181-208, published online December 2004.
-
(2004)
International Journal of Information Security
, vol.4
, Issue.3
, pp. 181-208
-
-
Basin, D.1
Mödersheim, S.2
-
31
-
-
33749413267
-
The CL-atse protocol analyser
-
Term Rewriting and Applications - 17th International Conference, RTA 2006, Proceedings
-
M. Turuani, The CL-Atse protocol analyser, in: F. Pfenning (Ed.), 17th International Conference on Term Rewriting and Applications, Lecture Notes in Computer Science, vol. 4098, Springer, Seattle, WA, USA, 2006, pp. 277-286. (Pubitemid 44502673)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4098
, pp. 277-286
-
-
Turuani, M.1
-
32
-
-
0000029077
-
Rewrite systems
-
J. van Leeuwen Ed., Elsevier Science Publishers and The MIT Press, Chapter 6
-
N. Dershowitz, J.-P. Jouannaud, Rewrite systems, in: J. van Leeuwen (Ed.), Handbook of Theoretical Computer Science, Formal Models and Semantics, vol. B, Elsevier Science Publishers and The MIT Press, 1990, pp. 243-320, Chapter 6.
-
(1990)
Handbook of Theoretical Computer Science, Formal Models and Semantics
, Issue.B
, pp. 243-320
-
-
Dershowitz, N.1
Jouannaud, J.-P.2
-
34
-
-
72649084870
-
Intruder deduction for AC-like equational theories with homomorphisms
-
LSV, ENS de Cachan, November
-
P. Lafourcade, D. Lugiez, R. Treinen, Intruder deduction for AC-like equational theories with homomorphisms, Research Report LSV-04-16, LSV, ENS de Cachan, November 2004.
-
(2004)
Research Report LSV-04-16
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
-
35
-
-
0027578148
-
Automatic recognition of tractability in inference relations
-
D. A. McAllester, Automatic recognition of tractability in inference relations, Journal of the ACM 40(2) (1993) 284-303.
-
(1993)
Journal of the ACM
, vol.40
, Issue.2
, pp. 284-303
-
-
McAllester, D.A.1
-
36
-
-
0000709547
-
Finiteness of the odd perfect and primitive abundant numbers with n prime factors
-
L. Dickson, Finiteness of the odd perfect and primitive abundant numbers with n prime factors, American Journal Mathematical Society 35(1913) 413-422.
-
(1913)
American Journal Mathematical Society
, vol.35
, pp. 413-422
-
-
Dickson, L.1
-
37
-
-
0026944928
-
On the regular structure of prefix rewriting
-
DOI 10.1016/0304-3975(92)90278-N
-
D. Caucal, On the regular structure of prefix rewriting, Theoretical Computer Science 106(1) (1992) 61-86. (Pubitemid 23605842)
-
(1992)
Theoretical Computer Science
, vol.106
, Issue.1
, pp. 61-86
-
-
Caucal Didier1
-
38
-
-
0034822801
-
Protocol insecurity with finite number of sessions is NP-complete
-
IEEE Comp. Soc. Press, Cape Breton Canada
-
M. Rusinowitch, M. Turuani, Protocol insecurity with finite number of sessions is NP-complete, in: Proceedings of the 14th Computer Security Foundations Workshop (CSFW'01), IEEE Comp. Soc. Press, Cape Breton (Canada), 2001, pp. 174-190.
-
(2001)
Proceedings of the 14th Computer Security Foundations Workshop (CSFW'01)
, pp. 174-190
-
-
Rusinowitch, M.1
Turuani, M.2
-
39
-
-
24944560619
-
Intruder deduction for AC-like equational theories with homomorphisms
-
Term Rewriting and Applications: 16th International Conference, RTA 2005, Proceedings
-
P. Lafourcade, D. Lugiez, R. Treinen, Intruder deduction for AC-like equational theories with homomorphisms, in: J. Giesl (Ed.), Proceedings of the 16th International Conference on Rewriting Techniques and Applications (RTA'05), Lecture Notes in Computer Science, vol. 467, Springer-Verlag, Nara, Japan, 2005, pp. 308-322. (Pubitemid 41313365)
-
(2005)
Lecture Notes in Computer Science
, vol.3467
, pp. 308-322
-
-
Lafourcade, P.1
Lugiez, D.2
Treinen, R.3
|