References

  1. Mart\'ın Abadi & Véronique Cortier (2006): Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1), pp. 2–32.
  2. Mart\'ın Abadi & Cédric Fournet (2001): Mobile values, new names, and secure communication. In: POPL '01: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM, New York, NY, USA, pp. 104–115.
  3. Mart\'ın Abadi & Andrew D. Gordon (1997): A calculus for cryptographic protocols: the spi calculus. In: CCS '97: Proceedings of the 4th ACM conference on Computer and communications security. ACM, New York, NY, USA, pp. 36–47.
  4. A. Armando, David A. Basin, Y. Boichut, Y. Chevalier, L. Compagna, J. Cuéllar, P. H. Drielsma, P.-C. Héam, O. Kouchnarenko, J. Mantovani, S. Mödersheim, D. von Oheimb, M. Rusinowitch, J. Santiago, M. Turuani, L. Viganò & L. Vigneron (2005): The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: CAV, pp. 281–285. Available at http://dx.doi.org/10.1007/11513988_27.
  5. Bruno Blanchet (2001): An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In: 14th IEEE Computer Security Foundations Workshop (CSFW-14). IEEE Computer Society, Cape Breton, Nova Scotia, Canada, pp. 82–96.
  6. Michael Burrows, Martin Abadi & Roger Needham (1990): A logic of authentication. ACM Trans. Comput. Syst. 8(1), pp. 18–36.
  7. Luis Caires (2004): Behavioral and Spatial Observations in a Logic for the Pi-Calculus. FoSSaCS 2004.
  8. Rohit Chadha, Stéphanie Delaune & Steve Kremer (2009): Epistemic Logic for the Applied Pi Calculus. In: D. Lee, A. Lopes & A. Poetzsch-Heffter: Proceedings of IFIP FMOODS/FORTE'09, Lecture Notes in Computer Science. Springer, pp. 182–197.
  9. C.J.F. Cremers (2008): The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Computer Aided Verification, 20th International Conference, CAV 2008, Princeton, USA, Proc., Lecture Notes in Computer Science 5123/2008. Springer, pp. 414–418.
  10. Anupam Datta, Ante Derek, John C. Mitchell & Arnab Roy (2007): Protocol Composition Logic (PCL). Theor. Comput. Sci. 172(1-3), pp. 311–358.
  11. Dorothy E. Denning & Giovanni Maria Sacco (1981): Timestamps in key distribution protocols. Commun. ACM 24(8), pp. 533–536.
  12. Danny Dolev & Andrew C. Yao (1981): On the security of public key protocols. Technical Report. Stanford University, Stanford, CA, USA.
  13. Gavin Lowe (1998): Casper: A Compiler for the Analysis of Security Protocols. In: Journal of Computer Security. Society Press, pp. 53–84.
  14. Étienne Lozes & Jules Villard (2008): A Spatial Equational Logic for the Applied Π-Calculus. In: CONCUR '08: Proceedings of the 19th international conference on Concurrency Theory. Springer-Verlag, Berlin, Heidelberg, pp. 387–401.
  15. Radu Mardare & Corrado Priami (2006): Dynamic Epistemic Spatial Logic. Technical Report. Center for Computational and Systems Biology, University of Trento.
  16. Michaël Rusinowitch & Mathieu Turuani (2003): Protocol insecurity with a finite number of sessions and composed keys is NP-complete. Theor. Comput. Sci. 299(1-3), pp. 451–475.
  17. Bernardo Toninho & Luis Caires (2009): A Spatial-Epistemic Logic and Tool for Reasoning about Security Protocols. Technical Report. Departamento de Informática, FCT/UNL.
  18. Thomas Y. C. Woo & Simon S. Lam (1993): A Semantic Model for Authentication Protocols. In: SP '93: Proceedings of the 1993 IEEE Symposium on Security and Privacy. IEEE Computer Society, Washington, DC, USA, pp. 178.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org