×

Found 47 Documents (Results 1–47)

Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later. (English) Zbl 1322.94089

Martí-Oliet, Narciso (ed.) et al., Logic, rewriting, and concurrency. Essays dedicated to José Meseguer on the occasion of his 65th birthday. Cham: Springer (ISBN 978-3-319-23164-8/pbk; 978-3-319-23165-5/ebook). Lecture Notes in Computer Science 9200, 475-492 (2015).
MSC:  94A60 68M12 68P25
PDFBibTeX XMLCite
Full Text: DOI

Alice and Bob meet equational theories. (English) Zbl 1321.68343

Martí-Oliet, Narciso (ed.) et al., Logic, rewriting, and concurrency. Essays dedicated to José Meseguer on the occasion of his 65th birthday. Cham: Springer (ISBN 978-3-319-23164-8/pbk; 978-3-319-23165-5/ebook). Lecture Notes in Computer Science 9200, 160-180 (2015).
MSC:  68Q60 68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Deciding security for protocols with recursive tests. (English) Zbl 1341.68013

Bjørner, Nikolaj (ed.) et al., Automated deduction – CADE-23. 23rd international conference on automated deduction, Wrocław, Poland, July 31 – August 5, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22437-9/pbk; 978-3-642-22438-6/ebook). Lecture Notes in Computer Science 6803. Lecture Notes in Artificial Intelligence, 49-63 (2011).
MSC:  68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Tree automata for detecting attacks on protocols with algebraic cryptographic primitives. (English) Zbl 1347.94020

Habermehl, P. (ed.) et al., Proceedings of the 8th, 9th, and 10th international workshops on verification of infinite-state systems (INFINITY 2006, 2007, 2008), Bonn, Germany, August 26, 2006, Lisbon, Portugal, September 8, 2007, Toronto, Canada, August 23, 2008. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 239, 57-72 (2009).
MSC:  94A60 68Q42 68Q45
PDFBibTeX XMLCite
Full Text: DOI

Simulation based security in the applied pi calculus. (English) Zbl 1250.94035

Kannan, Ravi (ed.) et al., IARCS annual conference on foundations of software technology and theoretical computer science (FSTTCS 2009), December 15–17, 2009, Kanpur, India. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-13-2). LIPIcs – Leibniz International Proceedings in Informatics 4, 169-180, electronic only (2009).
MSC:  94A60 94A62 03B70
PDFBibTeX XMLCite
Full Text: DOI Link

The open-source fixed-point model checker for symbolic analysis of security protocols. (English) Zbl 1252.68193

Aldini, Alessandro (ed.) et al., Foundations of security analysis and design V. FOSAD 2007/2008/2009 tutorial lectures. Berlin: Springer (ISBN 978-3-642-03828-0/pbk). Lecture Notes in Computer Science 5705, 166-194 (2009).
PDFBibTeX XMLCite
Full Text: DOI

Maude-NPA: cryptographic protocol analysis modulo equational properties. (English) Zbl 1252.94061

Aldini, Alessandro (ed.) et al., Foundations of security analysis and design V. FOSAD 2007/2008/2009 tutorial lectures. Berlin: Springer (ISBN 978-3-642-03828-0/pbk). Lecture Notes in Computer Science 5705, 1-50 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Validating security protocols under the general attacker. (English) Zbl 1252.68105

Degano, Pierpaolo (ed.) et al., Foundations and applications of security analysis. Joint workshop on automated reasoning for security protocol analysis and issues in the theory of security, ARSPA-WITS 2009, York, UK, March 28–29, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03458-9/pbk). Lecture Notes in Computer Science 5511, 34-51 (2009).
PDFBibTeX XMLCite
Full Text: DOI

Computing knowledge in security protocols under convergent equational theories. (English) Zbl 1250.03016

Schmidt, Renate A. (ed.), Automated deduction – CADE-22. 22nd international conference on automated deduction, Montreal, Canada, August 2–7, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02958-5/pbk). Lecture Notes in Computer Science 5663. Lecture Notes in Artificial Intelligence, 355-370 (2009).
MSC:  03B35 03B25 68M12 68T15 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

YAPA: a generic tool for computing intruder knowledge. (English) Zbl 1242.94018

Treinen, Ralf (ed.), Rewriting techniques and applications. 20th international conference, RTA 2009, Brasília, Brazil, June 29–July 1, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02347-7/pbk). Lecture Notes in Computer Science 5595, 148-163 (2009).
MSC:  94A60 03B25 68P25 68Q42 68T15
PDFBibTeX XMLCite
Full Text: DOI arXiv

Comparing state spaces in automatic security protocol analysis. (English) Zbl 1242.94022

Cortier, Véronique (ed.) et al., Formal to practical security. Papers issued from the 2005–2008 French-Japanese collaboration. Berlin: Springer (ISBN 978-3-642-02001-8/pbk). Lecture Notes in Computer Science 5458, 70-94 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI HAL

Cryptographic protocol composition via the authentication tests. (English) Zbl 1234.94045

de Alfaro, Luca (ed.), Foundations of software science and computational structures. 12th international conference, FOSSACS 2009, held as part of the joint European conferences on theory and practice of software, ETAPS 2009, York, UK, March 22–29, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00595-4/pbk). Lecture Notes in Computer Science 5504, 303-317 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

From one session to many: Dynamic tags for security protocols. (English) Zbl 1182.68082

Cervesato, Iliano (ed.) et al., Logic for programming, artificial intelligence, and reasoning. 15th international conference, LPAR 2008, Doha, Qatar, November 22–27, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89438-4/pbk). Lecture Notes in Computer Science 5330. Lecture Notes in Artificial Intelligence, 128-142 (2008).
MSC:  68P25 68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

A formal analysis of complex type flaw attacks on security protocols. (English) Zbl 1170.94330

Meseguer, José (ed.) et al., Algebraic methodology and software technology. 12th international conference, AMAST 2008, Urbana, IL, USA, July 28–31, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79979-5/pbk). Lecture Notes in Computer Science 5140, 167-183 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Modeling and analysis of security protocols using role based specifications and Petri nets. (English) Zbl 1143.68476

van Hee, Kees M. (ed.) et al., Applications and theory of Petri nets. 29th international conference, PETRI NETS 2008, Xi’an, China, June 23–27, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68745-0/pbk). Lecture Notes in Computer Science 5062, 72-91 (2008).
MSC:  68Q85 68Q60 94A62
PDFBibTeX XMLCite
Full Text: DOI HAL

Computational soundness of symbolic analysis for protocols using hash functions. (English) Zbl 1277.94026

Dima, Cătălin (ed.) et al., Proceedings of the first workshop in information and computer security (ICS 2006), Timisoara, Romania, September 30, 2006. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 186, 121-139 (2007).
MSC:  94A60 68Q05
PDFBibTeX XMLCite
Full Text: DOI

Explicit randomness is not necessary when modeling probabilistic encryption. (English) Zbl 1277.94021

Dima, Cătălin (ed.) et al., Proceedings of the first workshop in information and computer security (ICS 2006), Timisoara, Romania, September 30, 2006. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 186, 49-65 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

SAT-based verification of security protocols via translation to networks of automata. (English) Zbl 1196.68140

Edelkamp, Stefan (ed.) et al., Model checking and artificial intelligence. 4th workshop, MoChArt IV, Riva del Garda, Italy, August 29, 2006. Revised selected and invited papers. Berlin: Springer (ISBN 978-3-540-74127-5/pbk). Lecture Notes in Computer Science 4428. Lecture Notes in Artificial Intelligence, 146-165 (2007).
MSC:  68Q60 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptographically sound security proofs for basic and public-key Kerberos. (English) Zbl 1487.94149

Gollmann, Dieter (ed.) et al., Computer security – ESORICS 2006. 11th European symposium on research in computer security, Hamburg, Germany, September 18–20, 2006. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 4189, 362-383 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

The CL-Atse protocol analyser. (English) Zbl 1151.68454

Pfenning, Frank (ed.), Term rewriting and applications. 17th international conference, RTA 2006, Seattle, WA, USA, August 12–14, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-36834-2/pbk). Lecture Notes in Computer Science 4098, 277-286 (2006).
MSC:  68Q42 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Handling algebraic properties in automatic analysis of security protocols. (English) Zbl 1168.68378

Barkaoui, Kamel (ed.) et al., Theoretical aspects of computing – ICTAC 2006. Third international colloquium, Tunis, Tunisia, November 20–24, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-48815-6/pbk). Lecture Notes in Computer Science 4281, 153-167 (2006).
MSC:  68P25 68Q60 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A protocol for secure public instant messaging. (English) Zbl 1152.94437

Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 20-35 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Designing and verifying core protocols for location privacy. (English) Zbl 1156.94406

Katsikas, Sokratis K. (ed.) et al., Information security. 9th international conference, ISC 2006, Samos Island, Greece, August 30–September 2, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38341-3/pbk). Lecture Notes in Computer Science 4176, 502-516 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Deciding key cycles for security protocols. (English) Zbl 1165.94319

Hermann, Miki (ed.) et al., Logic for programming, artificial intelligence, and reasoning. 13th international conference, LPAR 2006, Phnom Penh, Cambodia, November 13–17, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-48281-9/pbk). Lecture Notes in Computer Science 4246. Lecture Notes in Artificial Intelligence, 317-331 (2006).
MSC:  94A60 68P25 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Computationally sound symbolic secrecy in the presence of hash functions. (English) Zbl 1177.94142

Arun-Kumar, S. (ed.) et al., FSTTCS 2006: Foundations of software technology and theoretical computer science. 26th international conference, Kolkata, India, December 13–15, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49994-7/pbk). Lecture Notes in Computer Science 4337, 176-187 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario. (English) Zbl 1180.68037

Aceto, Luca (ed.) et al., Foundations of software science and computation structures. 9th international conference, FOSSACS 2006, held as part of the joint European conferences on theory and practice of software, ETAPS 2006, Vienna, Austria, March 25–31, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33045-3/pbk). Lecture Notes in Computer Science 3921, 428-445 (2006).
MSC:  68M11 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

Main Field

all top 3

Software