@unknown(AbadiCortier06:0, author = "Mart\'{\i }n Abadi and V\'{e}ronique Cortier", year = "2006", title = "Deciding knowledge in security protocols under equational theories", journal = "Theor. Comput. Sci.", volume = "367", number = "1", pages = "2--32", ) @unknown(AbadiFournet01:0, author = "Mart\'{\i }n Abadi and C\'{e}dric Fournet", year = "2001", title = "Mobile values, new names, and secure communication", booktitle = "POPL '01: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages", publisher = "ACM", address = "New York, NY, USA", pages = "104--115", ) @unknown(266432, author = "Mart\'{\i }n Abadi and Andrew D. Gordon", year = "1997", title = "A calculus for cryptographic protocols: the spi calculus", booktitle = "CCS '97: Proceedings of the 4th ACM conference on Computer and communications security", publisher = "ACM", address = "New York, NY, USA", pages = "36--47", ) @unknown(Armando05, author = "A. Armando and David A. Basin and Y. Boichut and Y. Chevalier and L. Compagna and J. Cu{\'e}llar and P. H. Drielsma and P.-C. H{\'e}am and O. Kouchnarenko and J. Mantovani and S. M{\"o}dersheim and D. von Oheimb and M. Rusinowitch and J. Santiago and M. Turuani and L. Vigan{\`o} and L. Vigneron", year = "2005", title = "The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications", booktitle = "CAV", pages = "281--285", url = "http://dx.doi.org/10.1007/11513988_27", ) @unknown(BlanchetCSFW01, author = "Bruno Blanchet", year = "2001", title = "An {E}fficient {C}ryptographic {P}rotocol {V}erifier {B}ased on {P}rolog {R}ules", booktitle = "14th IEEE Computer Security Foundations Workshop (CSFW-14)", publisher = "IEEE Computer Society", address = "Cape Breton, Nova Scotia, Canada", pages = "82--96", ) @unknown(77649, author = "Michael Burrows and Martin Abadi and Roger Needham", year = "1990", title = "A logic of authentication", journal = "ACM Trans. Comput. Syst.", volume = "8", number = "1", pages = "18--36", ) @unknown(Caires04:0, author = "Luis Caires", year = "2004", title = "Behavioral and Spatial Observations in a Logic for the Pi-Calculus", journal = "FoSSaCS 2004", ) @unknown(CDK-forte09, author = "Rohit Chadha and St{\'e}phanie Delaune and Steve Kremer", year = "2009", title = "Epistemic Logic for the Applied Pi Calculus", editor = "D. Lee and A. Lopes and A. Poetzsch-Heffter", booktitle = "{P}roceedings of {IFIP} {FMOODS/FORTE}'09", series = "Lecture Notes in Computer Science", publisher = "Springer", pages = "182--197", ) @unknown(Cr2008Scyther, author = "C.J.F. Cremers", year = "2008", title = "The {S}cyther {T}ool: Verification, Falsification, and Analysis of Security Protocols", booktitle = "Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc.", series = "Lecture Notes in Computer Science", volume = "5123/2008", publisher = "Springer", pages = "414--418", ) @unknown(Datta07protocolcomposition, author = "Anupam Datta and Ante Derek and John C. Mitchell and Arnab Roy", year = "2007", title = "Protocol Composition Logic (PCL)", journal = "Theor. Comput. Sci.", volume = "172", number = "1-3", pages = "311--358", ) @unknown(358740, author = "Dorothy E. Denning and Giovanni Maria Sacco", year = "1981", title = "Timestamps in key distribution protocols", journal = "Commun. ACM", volume = "24", number = "8", pages = "533--536", ) @unknown(891726, author = "Danny Dolev and Andrew C. Yao", year = "1981", title = "On the security of public key protocols", type = "Technical Report", institution = "Stanford University", address = "Stanford, CA, USA", ) @unknown(Lowe98casper:a, author = "Gavin Lowe", year = "1998", title = "Casper: A Compiler for the Analysis of Security Protocols", booktitle = "Journal of Computer Security", publisher = "Society Press", pages = "53--84", ) @unknown(1431531, author = "\'{E}tienne Lozes and Jules Villard", year = "2008", title = "A Spatial Equational Logic for the Applied {$\Pi $}-Calculus", booktitle = "CONCUR '08: Proceedings of the 19th international conference on Concurrency Theory", publisher = "Springer-Verlag", address = "Berlin, Heidelberg", pages = "387--401", ) @unknown(mardarepriami06:0, author = "Radu Mardare and Corrado Priami", year = "2006", title = "Dynamic Epistemic Spatial Logic", type = "Technical Report", institution = "Center for Computational and Systems Biology, University of Trento", ) @unknown(Rus:Tur:03, author = "Micha{\"e}l Rusinowitch and Mathieu Turuani", year = "2003", title = "{Protocol insecurity with a finite number of sessions and composed keys is NP-complete}", journal = "Theor. Comput. Sci.", volume = "299", number = "1-3", pages = "451--475", ) @unknown(toninhocaires09:0, author = "Bernardo Toninho and Luis Caires", year = "2009", title = "A Spatial-Epistemic Logic and Tool for Reasoning about Security Protocols", type = "Technical Report", institution = "Departamento de Inform{\'a}tica, FCT/UNL", ) @unknown(884188, author = "Thomas Y. C. Woo and Simon S. Lam", year = "1993", title = "A Semantic Model for Authentication Protocols", booktitle = "SP '93: Proceedings of the 1993 IEEE Symposium on Security and Privacy", publisher = "IEEE Computer Society", address = "Washington, DC, USA", pages = "178", )