References in zbMATH (referenced in 19 articles , 1 standard article )

Showing results 1 to 19 of 19.
Sorted by year (citations)

  1. Boureanu, Ioana; Cohen, Mika; Lomuscio, Alessio: Automatic verification of temporal-epistemic properties of cryptographic protocols (2009)
  2. Jakubowska, Gizela; Penczek, Wojciech: Modelling and checking timed authentication of security protocols (2007)
  3. Kurkowski, Mirosław; Penczek, Wojciech: Verifying security protocols modelled by networks of automata (2007)
  4. Kurkowski, Mirosław; Penczek, Wojciech; Zbrzezny, Andrzej: SAT-based verification of security protocols via translation to networks of automata (2007)
  5. Haack, Christian; Jeffrey, Alan: Pattern-matching spi-calculus (2006)
  6. Bella, Giampaolo; Massacci, Fabio; Paulson, Lawrence C.: An overview of the verification of set (2005) ioport
  7. Bhargavan, Karthikeyan; Fournet, Cédric; Gordon, Andrew D.: A semantics for web services authentication (2005)
  8. Blanchet, Bruno; Podelski, Andreas: Verification of cryptographic protocols: tagging enforces termination (2005)
  9. Bozga, Liana; Ene, Cristian; Lakhnech, Yassine: A symbolic decision procedure for cryptographic protocols with time stamps (2005)
  10. Bozzano, Marco; Delzanno, Giorgio: Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (2005)
  11. Armando, Alessandro; Compagna, Luca: Abstraction-driven SAT-based analysis of security protocols (2004)
  12. Delzanno, Giorgio; Ganty, Pierre: Automatic verification of time sensitive cryptographic protocols (2004)
  13. Steel, Graham; Bundy, Alan; Maidl, Monika: Attacking a protocol for group key agreement by refuting incorrect inductive conjectures (2004)
  14. Comon-Lundh, Hubert; Cortier, Véronique: New decidability results for fragments of first-order logic and application to cryptographic protocols (2003)
  15. Hagiya, Masami; Takemura, Ryo; Takahashi, Koichi; Saito, Takamichi: Verification of authentication protocols based on the binding relation (2003)
  16. Necula, George C.; Schneck, Robert R.: Proof-carrying code with untrusted proof rules (2003)
  17. Armando, Alessandro; Compagna, Luca: Automatic SAT-compilation of protocol insecurity problems via reduction to planning (2002)
  18. Paulson, Lawrence C.: SET cardholder registration: The secrecy proofs (extended abstract) (2001)
  19. Cohen, Ernie: TAPS: A first-order verifier for cryptographic protocols (2000)