References in zbMATH (referenced in 20 articles , 1 standard article )

Showing results 1 to 20 of 20.
Sorted by year (citations)

  1. Boureanu, Ioana; Cohen, Mika; Lomuscio, Alessio: Automatic verification of temporal-epistemic properties of cryptographic protocols (2009)
  2. Millen, Jonathan K.: Rewriting techniques in the constraint solver (2009)
  3. Jakubowska, Gizela; Penczek, Wojciech: Modelling and checking timed authentication of security protocols (2007)
  4. Kurkowski, Mirosław; Penczek, Wojciech: Verifying security protocols modelled by networks of automata (2007)
  5. Kurkowski, Mirosław; Penczek, Wojciech; Zbrzezny, Andrzej: SAT-based verification of security protocols via translation to networks of automata (2007)
  6. Haack, Christian; Jeffrey, Alan: Pattern-matching spi-calculus (2006)
  7. Bella, Giampaolo; Massacci, Fabio; Paulson, Lawrence C.: An overview of the verification of set (2005)
  8. Bhargavan, Karthikeyan; Fournet, Cédric; Gordon, Andrew D.: A semantics for web services authentication (2005)
  9. Blanchet, Bruno; Podelski, Andreas: Verification of cryptographic protocols: tagging enforces termination (2005)
  10. Bozga, Liana; Ene, Cristian; Lakhnech, Yassine: A symbolic decision procedure for cryptographic protocols with time stamps (2005)
  11. Bozzano, Marco; Delzanno, Giorgio: Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (2005)
  12. Armando, Alessandro; Compagna, Luca: Abstraction-driven SAT-based analysis of security protocols (2004)
  13. Delzanno, Giorgio; Ganty, Pierre: Automatic verification of time sensitive cryptographic protocols (2004)
  14. Steel, Graham; Bundy, Alan; Maidl, Monika: Attacking a protocol for group key agreement by refuting incorrect inductive conjectures (2004)
  15. Comon-Lundh, Hubert; Cortier, Véronique: New decidability results for fragments of first-order logic and application to cryptographic protocols (2003)
  16. Hagiya, Masami; Takemura, Ryo; Takahashi, Koichi; Saito, Takamichi: Verification of authentication protocols based on the binding relation (2003)
  17. Necula, George C.; Schneck, Robert R.: Proof-carrying code with untrusted proof rules (2003)
  18. Armando, Alessandro; Compagna, Luca: Automatic SAT-compilation of protocol insecurity problems via reduction to planning (2002)
  19. Paulson, Lawrence C.: SET cardholder registration: The secrecy proofs (extended abstract) (2001)
  20. Cohen, Ernie: TAPS: A first-order verifier for cryptographic protocols (2000)