Author:
Arnaud Mathilde,Cortier Véronique,Delaune Stéphanie
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 387(1-2), 2–32 (2006)
2. Andel, T.R., Yasinsac, A.: Automated security analysis of ad hoc routing protocols. In: Proc. of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA 2007), pp. 9–26 (2007)
3. Lecture Notes in Computer Science;A. Armando,2005
4. Armando, A., Carbone, R., Compagna, L., Cuéllar, J., Tobarra, M.L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. In: Proc. of the 6th ACM Workshop on Formal Methods in Security Engineering (FMSE 2008), pp. 1–10 (2008)
5. Arnaud, M., Cortier, V., Delaune, S.: Deciding security for protocols with recursive tests. Research Report LSV-11-05, Laboratoire Spécification et Vérification, ENS Cachan, France, p. 46 (April 2011)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献