-
1
-
-
84885216561
-
On the reachability problem in cryptographic protocols
-
R. Amadio and D. Lugiez. On the reachability problem in cryptographic protocols. In CONCUR’2000, pages 380–394, 2000.
-
(2000)
CONCUR’2000
, pp. 380-394
-
-
Amadio, R.1
Lugiez, D.2
-
2
-
-
84937567009
-
The AVISS Security Protocol Analysis Tool
-
Tool presentation
-
A. Armando, D. Basin, M. Bouallagui, Y. Chevalier, L. Compagna, S. Mödersheim, M. Rusinowitch, M. Turuani, L. Vigano, and L. Vigneron. The AVISS Security Protocol Analysis Tool. In CAV’02, 2002. Tool presentation.
-
(2002)
CAV’02
-
-
Armando, A.1
Basin, D.2
Bouallagui, M.3
Chevalier, Y.4
Compagna, L.5
Mödersheim, S.6
Rusinowitch, M.7
Turuani, M.8
Vigano, L.9
Vigneron, L.10
-
3
-
-
84961379291
-
Lazy Infinite-State Analysis of Security Protocols
-
In R. Baumgart, editor, Heidelberg, Germany, Springer-Verlag
-
D. Basin. Lazy Infinite-State Analysis of Security Protocols. In R. Baumgart, editor, Secure Networking — CQRE (Secure)’99, LNCS 1740, pages 30–42, Heidelberg, Germany, 1999. Springer-Verlag.
-
(1999)
Secure Networking — CQRE (Secure)’99, LNCS
, vol.1740
, pp. 30-42
-
-
Basin, D.1
-
5
-
-
1842689528
-
Towards Efficient Automated Verification of Security Protocols
-
Università degli studi di Siena, TR DII 08/01
-
Y. Chevalier and L. Vigneron. Towards Efficient Automated Verification of Security Protocols. In Verification Workshop (VERIFY’01) (in connection with IJCAR’01), Università degli studi di Siena, TR DII 08/01, pages 19–33, 2001.
-
(2001)
Verification Workshop (VERIFY’01) (In Connection with IJCAR’01)
, pp. 19-33
-
-
Chevalier, Y.1
Vigneron, L.2
-
6
-
-
84937547671
-
-
Research Report 4369, Institut National de Recherche en Informatique et Automatique, Nancy (France)
-
Y. Chevalier and L. Vigneron. Automated Unbounded Verification of Security Protocols. Research Report 4369, Institut National de Recherche en Informatique et Automatique, Nancy (France), January 2002.
-
(2002)
Automated Unbounded Verification of Security Protocols
, vol.January
-
-
Chevalier, Y.1
Vigneron, L.2
-
8
-
-
35248897454
-
Tree Automata with one Memory, Set Constraints and Ping-Pong Protocols
-
Springer
-
H. Comon, V. Cortier, and J. Mitchell. Tree Automata with one Memory, Set Constraints and Ping-Pong Protocols. In 28th Int. Coll. Automata, Languages, and Programming (ICALP’2001), LNCS 2076, pages 682–693. Springer, 2001.
-
(2001)
28Th Int. Coll. Automata, Languages, and Programming (ICALP’2001), LNCS
, vol.2076
, pp. 682-693
-
-
Comon, H.1
Cortier, V.2
Mitchell, J.3
-
11
-
-
84876354671
-
A Method for Automatic Cryptographic Protocol Verification
-
Springer, May
-
J. Goubault-Larrecq. A Method for Automatic Cryptographic Protocol Verification. In IPDPS 2000 Workshops, Cancun, Mexico, LNCS 1800, pages 977–984. Springer, May 2000.
-
(2000)
IPDPS 2000 Workshops, Cancun, Mexico, LNCS 1800
, pp. 977-984
-
-
Goubault-Larrecq, J.1
-
12
-
-
84956860311
-
Compiling and Verifying Security Protocols
-
In M. Parigot and A. Voronkov, editors, Heidelberg, Springer-Verlag
-
F. Jacquemard, M. Rusinowitch, and L. Vigneron. Compiling and Verifying Security Protocols. In M. Parigot and A. Voronkov, editors, Proceedings of LPAR’2000, LNCS 1955, pages 131–160, Heidelberg, 2000. Springer-Verlag.
-
(2000)
Proceedings of LPAR’2000, LNCS 1955,
, pp. 131-160
-
-
Jacquemard, F.1
Rusinowitch, M.2
Vigneron, L.3
-
13
-
-
0033353968
-
Towards a Completeness Result for Model Checking of Security Protocols
-
G. Lowe. Towards a Completeness Result for Model Checking of Security Protocols. Journal of Computer Security 7, 1, 1999.
-
(1999)
Journal of Computer Security
, vol.7
, pp. 1
-
-
Lowe, G.1
-
17
-
-
0035072287
-
Athena, a Novel Approach to Efficient Automatic Security Protocol Analysis
-
D. Song, S. Berezin, and A. Perrig. Athena, a Novel Approach to Efficient Automatic Security Protocol Analysis. J. of Computer Security, 9((1,2)):47–74, 2001.
-
(2001)
J. Of Computer Security
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Song, D.1
Berezin, S.2
Perrig, A.3
-
18
-
-
0004021264
-
-
Technical Report 526, Indiana University, Computer Science Dept, February
-
S. Stoller. A Bound on Attacks on Authentication Protocols. Technical Report 526, Indiana University, Computer Science Dept, February 2000.
-
(2000)
A Bound on Attacks on Authentication Protocols
-
-
Stoller, S.1
-
19
-
-
84957718726
-
Positive Deduction modulo Regular Theories
-
Hans Kleine-Büning, editor, Berlin, 1995. Springer- Verlag. URL
-
L. Vigneron. Positive Deduction modulo Regular Theories. In Hans Kleine-Büning, editor, Computer Science Logic, LNCS 1092, pages 468–485, Berlin, 1995. Springer- Verlag. URL: http://www.loria.fr/equipes/protheo/SOFTWARES/DATAC/.
-
Computer Science Logic, LNCS
, vol.1092
, pp. 468-485
-
-
Vigneron, L.1
|