30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

202 BIBLIOGRAPHY<br />

[12] M. Abadi <strong>and</strong> A.D. Gordon. A calculus for cryptographic protocols: The<br />

spi calculus. Information <strong>and</strong> Computation, pages 148(1):1–70, January 1999.<br />

[13] M. Abadi <strong>and</strong> Ph. Rogaway. Reconciling two views <strong>of</strong> cryptography (the<br />

computational soundness <strong>of</strong> formal encryption). J. Cryptology, 15(2):103–<br />

127, 2002.<br />

[14] R. M. Amadio <strong>and</strong> W. Charatonik. On name generation <strong>and</strong> set-based<br />

analysis in the dolev-yao model. In L. Brim, P. Jancar, M. Kretínsk´y, <strong>and</strong><br />

A. Kucera, editors, CONCUR, volume 2421 <strong>of</strong> Lecture Notes in Computer<br />

Science, pages 499–514. Springer, 2002.<br />

[15] R. M. Amadio <strong>and</strong> D. Lugiez. On the reachability problem in cryptographic<br />

protocols. In C. Palamidessi, editor, CONCUR, volume 1877 <strong>of</strong><br />

Lecture Notes in Computer Science, pages 380–394. Springer, 2000.<br />

[16] R. M. Amadio, D. Lugiez, <strong>and</strong> V. Vanackère. On the symbolic reduction<br />

<strong>of</strong> processes with cryptographic functions. Theor. Comput. Sci., 290(1):695–<br />

740, 2003.<br />

[17] A. Arm<strong>and</strong>o, D. A. Basin, M. Bouallagui, Y. Chevalier, L. Compagna,<br />

S. Mödersheim, M. Rusinowitch, M. Turuani, L. Viganò, <strong>and</strong> L. Vigneron.<br />

The aviss security protocol analysis tool. In E. Brinksma <strong>and</strong> K. Guldstr<strong>and</strong><br />

Larsen, editors, CAV, volume 2404 <strong>of</strong> Lecture Notes in Computer<br />

Science, pages 349–353. Springer, 2002.<br />

[18] G. Ateniese <strong>and</strong> B. de Medeiros. A provably secure nyberg-rueppel signature<br />

variant with applications. Technical Report, In Cryptology ePrint<br />

Archive, Report 2004/93, 2004.<br />

[19] AVISPA Tool Set. http://www.avispa-project.org/.<br />

[20] F. Baader. The theory <strong>of</strong> idempotent semigroups is <strong>of</strong> unification type<br />

zero. J. Autom. Reasoning, 2(3):283–286, 1986.<br />

[21] F. Baader <strong>and</strong> T. Nipkow. Term Rewriting <strong>and</strong> All That. Cambridge University<br />

Press, 1998.<br />

[22] F. Baader <strong>and</strong> W. Snyder. Unification theory. In J. A. Robinson <strong>and</strong> A.<br />

Voronkov editors, H<strong>and</strong>book <strong>of</strong> Automated Reasoning, Elsevier <strong>and</strong> MIT Press,<br />

pages 445–532. 2001.<br />

[23] L. Bachmair. Canonical equational pro<strong>of</strong>s. Progress in Theoretical Computer<br />

Science, Birkhauser, 1991.<br />

[24] L. Bachmair <strong>and</strong> H. Ganzinger. On restrictions <strong>of</strong> ordered paramodulation<br />

with simplification. In M. E. Stickel, editor, CADE, volume 449 <strong>of</strong> Lecture<br />

Notes in Computer Science, pages 427–441. Springer, 1990.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!