A probabilistic poly-time framework for protocol analysis
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Paradigm shifts in protocol analysis
Proceedings of the 1999 workshop on New security paradigms
Finite-state analysis of two contract signing protocols
Theoretical Computer Science
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis
ESOP '01 Proceedings of the 10th European Symposium on Programming Languages and Systems
Specifying Authentication Protocols Using Rewriting and Strategies
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
Multiset Rewriting and Security Protocol Analysis
RTA '02 Proceedings of the 13th International Conference on Rewriting Techniques and Applications
Analysis of Abuse-Free Contract Signing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Probabilistic Polynomial-Time Equivalence and Security Analysis
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
A Game-Based Verification of Non-repudiation and Fair Exchange Protocols
CONCUR '01 Proceedings of the 12th International Conference on Concurrency Theory
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
A Meta-Notation for Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Game Analysis of Abuse-free Contract Signing
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
How to prevent type flaw attacks on security protocols
Journal of Computer Security - CSFW13
A game-based verification of non-repudiation and fair exchange protocols
Journal of Computer Security - IFIP 2000
Multiset rewriting and the complexity of bounded security protocols
Journal of Computer Security
Preventing type flaw attacks on security protocols with a simplified tagging scheme
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols
Theoretical Computer Science
Deriving the type flaw attacks in the Otway-Rees protocol by rewriting
Nordic Journal of Computing - Selected papers of the 17th nordic workshop on programming theory (NWPT'05), October 19-21, 2005
A rewriting-based inference system for the NRL Protocol analyzer and its meta-logical properties
Theoretical Computer Science - Automated reasoning for security protocol analysis
Cryptographic logical relations
Theoretical Computer Science
A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
AMAST 2008 Proceedings of the 12th international conference on Algebraic Methodology and Software Technology
Comparing State Spaces in Automatic Security Protocol Analysis
Formal to Practical Security
Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
Rule-based Programming in Java For Protocol Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
Comparison of cryptographic verification tools dealing with algebraic properties
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
An improved e-commerce protocol for fair exchange
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Soundness of removing cancellation identities in protocol analysis under Exclusive-OR
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
Sound security protocol transformations
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
Hi-index | 0.00 |