FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science

From MaRDI portal
Revision as of 16:35, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5191511

DOI10.1007/B94618zbMath1205.94078OpenAlexW2246750081MaRDI QIDQ5191511

Yannick Chevalier, Mathieu Turuani, Ralf Küsters, Michaël Rusinowitch

Publication date: 6 August 2009

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b94618




Related Items (25)

The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security ProtocolsDeciding knowledge in security protocols under equational theoriesA rewriting-based inference system for the NRL protocol analyzer and its meta-logical propertiesDecision procedures for the security of protocols with probabilistic encryption against offline dictionary attacksIntruder deduction for the equational theory of abelian groups with distributive encryptionSymbolic reachability analysis using narrowing and its application to verification of cryptographic protocolsDeciding Knowledge in Security Protocols for Monoidal Equational TheoriesUnnamed ItemDecidability and combination results for two notions of knowledge in security protocolsDeducibility constraints and blind signaturesChallenges in the Automated Verification of Security ProtocolsComputing knowledge in equational extensions of subterm convergent theoriesTransducer-based analysis of cryptographic protocolsIntruder deduction problem for locally stable theories with normal forms and inversesSymbolic protocol analysis for monoidal equational theoriesHierarchical combination of intruder theoriesAbstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automaticallyAn NP decision procedure for protocol insecurity with XORSimulation relations for alternating Büchi automataA method for symbolic analysis of security protocolsFlat and One-Variable Clauses for Single Blind Copying Protocols: The XOR CaseProtocol Security and Algebraic Properties: Decision Results for a Bounded Number of SessionsEasy intruder deduction problems with homomorphismsAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifLimits of the Cryptographic Realization of Dolev-Yao-Style XOR







This page was built for publication: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science