Author:
Chevalier Yannick,Rusinowitch Michaël
Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference19 articles.
1. Deciding knowledge in security protocols under equational theories;Abadi;Theor. Comput. Sci.,2006
2. Intruders with caps;Anantharaman,2007
3. Combining algorithms for deciding knowledge in security protocols;Arnaud,2007
4. M. Baudet, V. Cortier, S. Delaune, YAPA: A generic tool for computing intruder knowledge, in: RTA'09, 20th International Conference on Rewriting Techniques and Applications, 2009
5. P. Bieber, A logic of communication in Hostile environments, in: Proceedings of the 1990 IEEE Computer Security Foundations Workshop, pp. 14–22
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Implementing Security Protocol Monitors;Electronic Proceedings in Theoretical Computer Science;2021-09-06
2. Security protocol specification and verification with AnBx;Journal of Information Security and Applications;2016-10
3. Formal Models for Analyzing Security Protocols: Some Lecture Notes;NATO SCI PEAC SECUR;2016
4. Alice and Bob: Reconciling Formal Models and Implementation;Programming Languages with Applications to Biology and Security;2015
5. Alice and Bob Meet Equational Theories;Lecture Notes in Computer Science;2015