


default search action
Formal Models and Techniques for Analyzing Security Protocols, 2011
- Véronique Cortier, Steve Kremer:

Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series 5, IOS Press 2011, ISBN 978-1-60750-713-0 - Véronique Cortier, Steve Kremer:

Introduction. 1-12 - Michaël Rusinowitch, Mathieu Turuani:

Verifying a bounded number of sessions and its complexity. 13-34 - Hubert Comon-Lundh, Stéphanie Delaune, Jonathan K. Millen:

Constraint solving techniques and enriching the model with equational theories. 35-61 - Gavin Lowe:

Analysing Security Protocols using CSP. 62-85 - Bruno Blanchet

:
Using Horn Clauses for Analyzing Security Protocols. 86-111 - Mark Dermot Ryan

, Ben Smyth:
Applied pi calculus. 112-142 - Riccardo Focardi

, Matteo Maffei:
Types for Security Protocols. 143-181 - Anupam Datta, John C. Mitchell, Arnab Roy, Stephan Hyeonjun Stiller:

Protocol Composition Logic. 182-221 - Joshua D. Guttman

:
Shapes: Surveying Crypto Protocol Runs. 222-257 - Steve A. Schneider

:
Security Analysis using Rank Functions in CSP. 258-276 - Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi:

Computational Soundness - The Case of Diffie-Hellman Keys. 277-302

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














