-
1
-
-
0036040302
-
Analyzing security protocols with secrecy types and logic programs
-
Portland, OR, January 2002. ACM Press, New York
-
Abadi M, Blanchet B (2002) Analyzing security protocols with secrecy types and logic programs. In: Proceedings of the 29th annual ACM SIGPLAN - SIGACT symposium on principles of programming languages (POPL 2002), Portland, OR, January 2002. ACM Press, New York, pp 33-44
-
(2002)
Proceedings of the 29th Annual ACM SIGPLAN - SIGACT Symposium On Principles of Programming Languages (POPL 2002)
, pp. 33-44
-
-
Abadi, M.1
Blanchet, B.2
-
2
-
-
0030643343
-
A calculus for cryptographic protocols: The spi calculus
-
Z urich, Switzerland, April 1997. ACM Press, New York
-
Abadi M, Gordon AD (1997) A calculus for cryptographic protocols: the spi calculus. In: Proceedings of the 4th ACM conference on computer and communications security, Z urich, Switzerland, April 1997. ACM Press, New York, pp 36-47
-
(1997)
Proceedings of the 4th ACM Conference On Computer and Communications Security
, pp. 36-47
-
-
Abadi, M.1
Gordon, A.D.2
-
3
-
-
0000298407
-
A bisimulation method for cryptographic protocols
-
Abadi M, Gordon AD (1998) A bisimulation method for cryptographic protocols. Nordic J Comput 5(4):267-303
-
(1998)
Nordic J Comput
, vol.5
, Issue.4
, pp. 267-303
-
-
Abadi, M.1
Gordon, A.D.2
-
4
-
-
0001975827
-
Logic programming
-
In: Van Leeuwen J, Elsevier/MIT Press, Amsterdam/Cambridge, MA
-
Apt K (1990) Logic programming. In: Van Leeuwen J (ed) Handbook of theoretical computer science, vol B: Formal models and semantics. Elsevier/MIT Press, Amsterdam/Cambridge, MA, pp 493-574
-
(1990)
Handbook of Theoretical Computer Science, Vol B: Formal Models and Semantics
, pp. 493-574
-
-
Apt, K.1
-
6
-
-
84937200470
-
Local and symbolic bisimulation using tabled constraint logic programming
-
Cyprus, November 2001
-
Basu S, Mukund M, Ramakrishnan CR, Ramakrishnan IV, Verma RM (2001) Local and symbolic bisimulation using tabled constraint logic programming. In: Proceedings of the international conference on logic programming, Cyprus, November 2001, pp 166-180
-
(2001)
Proceedings of the International Conference On Logic Programming
, pp. 166-180
-
-
Basu, S.1
Mukund, M.2
Ramakrishnan, C.R.3
Ramakrishnan, I.V.4
Verma, R.M.5
-
8
-
-
84958749546
-
From secrecy to authenticity in security protocols
-
In: Hermenegildo M, Puebla G, Springer, Berlin Heidelberg New York
-
Blanchet B (2002) From secrecy to authenticity in security protocols. In: Hermenegildo M, Puebla G (eds) Proceedings of the 9th international static analysis symposium, Madrid, September 2002. Lecture notes in computer science, vol 2477. Springer, Berlin Heidelberg New York, pp 242-259
-
(2002)
Proceedings of the 9th International Static Analysis Symposium, Madrid, September 2002. Lecture Notes In Computer Science
, vol.2477
, pp. 242-259
-
-
Blanchet, B.1
-
9
-
-
35248878042
-
Verification of cryptographic protocols: Tagging enforces termination
-
Warsaw, Poland, April 2003. Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Blanchet B, Podelski A (2003) Verification of cryptographic protocols: tagging enforces termination. In: Proceedings of the conference on foundations of software science and computation structures (FoSSaCS'03), Warsaw, Poland, April 2003. Lecture notes in computer science, vol 2620. Springer, Berlin Heidelberg New York, pp 136-152
-
(2003)
Proceedings of the Conference On Foundations of Software Science and Computation Structures (FoSSaCS'03)
, vol.2620
, pp. 136-152
-
-
Blanchet, B.1
Podelski, A.2
-
10
-
-
0013126638
-
A logic of authentication, from Proceedings of the Royal Society 426(1871)
-
In: Stallings W, IEEE Press, New York
-
Burrows M, Abadi M, Needham R (1996) A logic of authentication, from Proceedings of the Royal Society 426(1871), 1989. In: Stallings W (ed) Practical cryptography for data Internetworks. IEEE Press, New York
-
(1996)
Practical Cryptography For Data Internetworks
, pp. 1989
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
11
-
-
0029695436
-
Tabled evaluation with delaying for general logic programs
-
Chen W, Warren DS (1996) Tabled evaluation with delaying for general logic programs. J ACM 43(1):20-74
-
(1996)
J ACM
, vol.43
, Issue.1
, pp. 20-74
-
-
Chen, W.1
Warren, D.S.2
-
13
-
-
84867776654
-
A system for tabled constraint logic programming
-
London, UK, July 2000. Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Cui B, Warren DS (2000) A system for tabled constraint logic programming. In: Proceedings of the 1st international conference on computational logic, London, UK, July 2000. Lecture notes in computer science, vol 1861. Springer, Berlin Heidelberg New York, pp 478-492
-
(2000)
Proceedings of the 1st International Conference On Computational Logic
, vol.1861
, pp. 478-492
-
-
Cui, B.1
Warren, D.S.2
-
16
-
-
0006103517
-
An optimizing compiler for efficient model checking
-
Beijing, October 1999. Kluwer, Dordrecht
-
Dong Y, Ramakrishnan CR (1999) An optimizing compiler for efficient model checking. In: Formal methods for protocol engineering and distributed systems (FORTE). Proceedings of IFIP, Beijing, October 1999. Kluwer, Dordrecht, 156:241-256
-
(1999)
Formal Methods For Protocol Engineering and Distributed Systems (FORTE). Proceedings of IFIP
, vol.156
, pp. 241-256
-
-
Dong, Y.1
Ramakrishnan, C.R.2
-
17
-
-
84944872561
-
Principles of mobile Maude
-
In: Kotz D, Mattern F, Switzerland, September 2000. Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Duran F, Eker S, Lincoln P, Meseguer J (2000) Principles of mobile Maude. In: Kotz D, Mattern F (eds) Proceedings of ASA/MA, Switzerland, September 2000. Lecture notes in computer science, vol 1882. Springer, Berlin Heidelberg New York, pp 73-85
-
(2000)
Proceedings of ASA/MA
, vol.1882
, pp. 73-85
-
-
Duran, F.1
Eker, S.2
Lincoln, P.3
Meseguer, J.4
-
19
-
-
0034835462
-
Authenticity by typing for security protocols
-
Cape Breton, Novia Scotia, Canada, June 2001
-
Gordon A, Jeffrey ASA (2001) Authenticity by typing for security protocols. In: Proceedings of the IEEE computer security foundations workshop, Cape Breton, Novia Scotia, Canada, June 2001, pp 145-159
-
(2001)
Proceedings of the IEEE Computer Security Foundations Workshop
, pp. 145-159
-
-
Gordon, A.1
Jeffrey, A.S.A.2
-
21
-
-
0002734357
-
-
Technical report, School of Cognitive and Computer Science, University of Sussex, Sussex, UK
-
Lin H (1994) Symbolic bisimulation and proof systems for the π-calculus. Technical report, School of Cognitive and Computer Science, University of Sussex, Sussex, UK
-
(1994)
Symbolic Bisimulation and Proof Systems For the π-calculus
-
-
Lin, H.1
-
23
-
-
28144456308
-
An attack on the Needham-Schroeder public-key authentication protocol
-
Lowe G (1995) An attack on the Needham-Schroeder public-key authentication protocol. Inf Process Lett 56(3):131-133
-
(1995)
Inf Process Lett
, vol.56
, Issue.3
, pp. 131-133
-
-
Lowe, G.1
-
24
-
-
26444574191
-
Breaking and fixing the Needham-Schroeder public-key protocol using FDR
-
Lowe G (1996) Breaking and fixing the Needham-Schroeder public-key protocol using FDR. Softw Concepts Tools 17:93-102
-
(1996)
Softw Concepts Tools
, vol.17
, pp. 93-102
-
-
Lowe, G.1
-
25
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
Meadows C (1996) The NRL protocol analyzer: an overview. J Logic Programm 26(2):113-131
-
(1996)
J Logic Programm
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
27
-
-
0003954103
-
Communication and concurrency
-
Prentice-Hall, Upper Saddle River, NJ
-
Milner R (1989) Communication and concurrency. In: International Series in Computer Science. Prentice-Hall, Upper Saddle River, NJ
-
(1989)
International Series In Computer Science
-
-
Milner, R.1
-
28
-
-
0000511698
-
The polyadic π-calculus: A tutorial
-
Bauer FL, Brauer W, Schwichtenberg H (eds), Springer, Berlin Heidelberg New York
-
Milner R (1993) The polyadic π-calculus: a tutorial. In: Bauer FL, Brauer W, Schwichtenberg H (eds) Logic and algebra of specification. Springer, Berlin Heidelberg New York, pp 203-246
-
(1993)
Logic and Algebra of Specification
, pp. 203-246
-
-
Milner, R.1
-
29
-
-
44049113210
-
A calculus of mobile processes, parts I and II
-
Milner R, Parrow J, Walker D (1992) A calculus of mobile processes, parts I and II. Inf Comput 100(1):1-77
-
(1992)
Inf Comput
, vol.100
, Issue.1
, pp. 1-77
-
-
Milner, R.1
Parrow, J.2
Walker, D.3
-
31
-
-
0000335030
-
An algebraic verification of a mobile network
-
Orava F, Parrow J (1992) An algebraic verification of a mobile network. Formal Aspects Comput 4:497-543
-
(1992)
Formal Aspects Comput
, vol.4
, pp. 497-543
-
-
Orava, F.1
Parrow, J.2
-
32
-
-
0010728871
-
An introduction to the π-calculus
-
Bergstra JA, Ponse A, Smolka SA (eds), Elsevier, Amsterdam
-
Parrow J (2001) An introduction to the π-calculus. In: Bergstra JA, Ponse A, Smolka SA (eds) Handbook of process algebra. Elsevier, Amsterdam
-
(2001)
Handbook of Process Algebra
-
-
Parrow, J.1
-
33
-
-
0031643297
-
The inductive approach to verifying cryptographic protocols
-
Paulson L (1998) The inductive approach to verifying cryptographic protocols. J Comput Secur 6:85-128
-
(1998)
J Comput Secur
, vol.6
, pp. 85-128
-
-
Paulson, L.1
-
34
-
-
84947433380
-
Efficient model checking using tabled resolution
-
Haifa, Israel, June 1997. Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Ramakrishna YS, Ramakrishnan CR, Ramakrishnan IV, Smolka SA, Swift TW, Warren DS (1997) Efficient model checking using tabled resolution. In: Proceedings of the 9th international conference on computer-aided verification (CAV), Haifa, Israel, June 1997. Lecture notes in computer science, vol 1254. Springer, Berlin Heidelberg New York, pp 143-154
-
(1997)
Proceedings of the 9th International Conference On Computer-aided Verification (CAV)
, vol.1254
, pp. 143-154
-
-
Ramakrishna, Y.S.1
Ramakrishnan, C.R.2
Ramakrishnan, I.V.3
Smolka, S.A.4
Swift, T.W.5
Warren, D.S.6
-
35
-
-
84863927612
-
Verification of parameterized systems using logic-program transformations
-
Berlin, March 2000. Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Roychoudhury A, Narayan Kumar K, Ramakrishnan CR, Ra-makrishnan IV, Smolka SA (2000) Verification of parameterized systems using logic-program transformations. In: Proceedings of the 6th international conference on tools and algorithms for the construction and analysis of systems (TACAS), Berlin, March 2000. Lecture notes in computer science, vol 1785. Springer, Berlin Heidelberg New York, pp 172-187
-
(2000)
Proceedings of the 6th International Conference On Tools and Algorithms For the Construction and Analysis of Systems (TACAS)
, vol.1785
, pp. 172-187
-
-
Roychoudhury, A.1
Narayan, K.K.2
Ramakrishnan, C.R.3
Ra-Makrishnan, I.V.4
Smolka, S.A.5
-
36
-
-
0001132880
-
Local model checking in the modal mu-calculus
-
Stirling C, Walker D (1991) Local model checking in the modal mu-calculus. Theor Comput Sci 89(1):161-177
-
(1991)
Theor Comput Sci
, vol.89
, Issue.1
, pp. 161-177
-
-
Stirling, C.1
Walker, D.2
-
38
-
-
85034427623
-
OLDT resolution with tabulation
-
London, UK, July 1986. MIT Press, Cambridge, MA
-
Tamaki H, Sato T (1986) OLDT resolution with tabulation. In: Proceedings of the international conference on logic programming, London, UK, July 1986. MIT Press, Cambridge, MA, pp 84-98
-
(1986)
Proceedings of the International Conference On Logic Programming
, pp. 84-98
-
-
Tamaki, H.1
Sato, T.2
-
41
-
-
19044388279
-
-
Technical report, Department of Computer Systems, Uppsala University, Sweden
-
Victor B (1995) The Mobility Workbench user's guide. Technical report, Department of Computer Systems, Uppsala University, Sweden
-
(1995)
The Mobility Workbench User's Guide
-
-
Victor, B.1
-
42
-
-
85006239926
-
The Mobility Workbench - a tool for the π-calculus
-
In: Dill D, Stanford, CA, June 1994. Springer, Berlin Heidelberg New York
-
Victor B, Moller F (1994) The Mobility Workbench - a tool for the π-calculus. In: Dill D (ed) Proceedings of the 6th international conference on computer-aided verification (CAV'94), Stanford, CA, June 1994. Springer, Berlin Heidelberg New York
-
(1994)
Proceedings of the 6th International Conference On Computer-aided Verification (CAV'94)
-
-
Victor, B.1
Moller, F.2
-
43
-
-
0027205880
-
A semantic model for authentication protocols
-
Oakland, CA, May 1993
-
Woo TYC, Lam SS (1993) A semantic model for authentication protocols. In: Proceedings of the IEEE symposium on research in security and privacy, Oakland, CA, May 1993, pp 178-194
-
(1993)
Proceedings of the IEEE Symposium On Research In Security and Privacy
, pp. 178-194
-
-
Woo, T.Y.C.1
Lam, S.S.2
|