-
1
-
-
84874721980
-
On the symbolic reduction of processes with cryptographic functions
-
(to appear). Also RR 4147, INRIA
-
R. Amadio, D. Lugiez, and V. Vanackere. On the symbolic reduction of processes with cryptographic functions. Theoretical Computer Science (to appear). Also RR 4147, INRIA.
-
Theoretical Computer Science
-
-
Amadio, R.1
Lugiez, D.2
Vanackere, V.3
-
2
-
-
84874736696
-
On name generation and set-based analysis in the dolev-yao model
-
January
-
R. Amadio, W. Charatonik. On name generation and set-based analysis in the Dolev-Yao model. RR-INRIA 4379, January 2002.
-
(2002)
RR-INRIA 4379
-
-
Amadio, R.1
Charatonik, W.2
-
3
-
-
84874743229
-
On the decidability of fragments of the asynchronous π-calculus
-
(to appear). Also RR-INRIA 4241
-
R. Amadio, C. Meyssonnier. On the decidability of fragments of the asynchronous π-calculus. Journal of Nordic Computing (to appear). Also RR-INRIA 4241.
-
Journal of Nordic Computing
-
-
Amadio, R.1
Meyssonnier, C.2
-
6
-
-
35248897454
-
Tree automata with one memory, set constraints, and ping-pong protocols
-
Springer Lecture Notes in Comp. Sci. 2076
-
H. Comon, V. Cortier, and J. Mitchell. Tree automata with one memory, set constraints, and ping-pong protocols. In Proc. ICALP, Springer Lecture Notes in Comp. Sci. 2076, 2001.
-
(2001)
Proc. ICALP
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.3
-
9
-
-
0011121265
-
Undecidability of bounded security protocols
-
FLOC Workshop, Trento
-
N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. Undecidability of bounded security protocols. In Proc. Formal methods and security protocols, FLOC Workshop, Trento, 1999.
-
(1999)
Proc. Formal Methods and Security Protocols
-
-
Durgin, N.1
Lincoln, P.2
Mitchell, J.3
Scedrov, A.4
-
10
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. Yao. On the security of public key protocols. IEEE Trans. on Information Theory, 29(2):198-208, 1983.
-
(1983)
IEEE Trans. on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.2
-
11
-
-
84937389998
-
Rewriting for cryptographic protocol verification
-
Springer Lecture Notes in Comp. Sci. 1831
-
T. Genet and F. Klay. Rewriting for cryptographic protocol verification. In Proc. CADE, Springer Lecture Notes in Comp. Sci. 1831, 2000.
-
(2000)
Proc. CADE
-
-
Genet, T.1
Klay, F.2
-
12
-
-
0011121266
-
A method for automatic cryptographic protocol verification
-
Springer-Verlag
-
J. Goubault. A method for automatic cryptographic protocol verification. In Proc. FMPPTA, Springer-Verlag, 2000.
-
(2000)
Proc. FMPPTA
-
-
Goubault, J.1
-
13
-
-
84874702382
-
A decision procedure for a class of set constraints (extended abstract)
-
N. Heintze and J. Jaffar. A decision procedure for a class of set constraints (extended abstract). In Proc. 5th IEEE LICS, 1990.
-
(1990)
Proc. 5th IEEE LICS
-
-
Heintze, N.1
Jaffar, J.2
-
15
-
-
84957716708
-
Abstracting cryptographic protocols with tree automata
-
Springer Lect. Notes in Comp. Sci.
-
D. Monniaux. Abstracting cryptographic protocols with tree automata. In Proc. Static Analysis Symposium, Springer Lect. Notes in Comp. Sci., 1999.
-
(1999)
Proc. Static Analysis Symposium
-
-
Monniaux, D.1
-
16
-
-
84874714003
-
Protocol insecurity with finite number of sessions is NP-complete
-
March
-
M. Rusinowitch and M. Turuani Protocol insecurity with finite number of sessions is NP-complete. RR INRIA 4134, March 2001.
-
(2001)
RR INRIA 4134
-
-
Rusinowitch, M.1
Turuani, M.2
-
17
-
-
0004021264
-
A bound on attacks on authentication protocols
-
CS Dept., july
-
S. Stoller. A bound on attacks on authentication protocols. TR 526, Indiana University, CS Dept., july 1999.
-
(1999)
TR 526, Indiana University
-
-
Stoller, S.1
-
18
-
-
0012119217
-
Generalized definite set constraints
-
January
-
J.-M. Talbot, Ph. Devienne, and S. Tison. Generalized definite set constraints. Constraints: An International Journal, 5(1-2):161-202, January 2000.
-
(2000)
Constraints: An International Journal
, vol.5
, Issue.1-2
, pp. 161-202
-
-
Talbot, J.-M.1
Devienne, Ph.2
Tison, S.3
-
19
-
-
84957640213
-
Towards an automatic analysis of security protocols in first-order logic
-
Springer Lect. Notes in Comp. Sci. (LNAI) 1632
-
C. Weidenbach. Towards an automatic analysis of security protocols in first-order logic. In Proc. CADE 99. Springer Lect. Notes in Comp. Sci. (LNAI) 1632, 1999.
-
(1999)
Proc. CADE 99
-
-
Weidenbach, C.1
|