Author:
Anantharaman Siva,Lin Hai,Lynch Christopher,Narendran Paliath,Rusinowitch Michaël
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Lecture Notes in Computer Science;S. Anantharaman,2007
2. Anantharaman, S., Lin, H., Lynch, C., Narendran, P., Rusinowitch, M.: Equational and Cap Unification for Intrusion Analysis. LIFO-Research Report, http://www.univ-orleans.fr/lifo/prodsci/rapports/RR/RR2008/RR-2008-03.pdf
3. Baudet, M.: Deciding security of protocols against off-line guessing attacks. In: Proc. of ACM Conf. on Computer and Communications Security, pp. 16–25 (2005)
4. Comon-Lundh, H., Shmatikov, V.: Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive-Or. In: Proc. of the Logic In Computer Science Conference, LICS 2003, pp. 271–280 (2003)
5. Cortier, V., Delaune, S., Lafourcade, P.: A Survey of Algebraic Properties Used in Cryptographic Protocols. Journal of Computer Security 14(1), 1–43 (2006)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献