Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
202 BIBLIOGRAPHY<br />
[12] M. Abadi <strong>and</strong> A.D. Gordon. A calculus for cryptographic protocols: The<br />
spi calculus. Information <strong>and</strong> Computation, pages 148(1):1–70, January 1999.<br />
[13] M. Abadi <strong>and</strong> Ph. Rogaway. Reconciling two views <strong>of</strong> cryptography (the<br />
computational soundness <strong>of</strong> formal encryption). J. Cryptology, 15(2):103–<br />
127, 2002.<br />
[14] R. M. Amadio <strong>and</strong> W. Charatonik. On name generation <strong>and</strong> set-based<br />
analysis in the dolev-yao model. In L. Brim, P. Jancar, M. Kretínsk´y, <strong>and</strong><br />
A. Kucera, editors, CONCUR, volume 2421 <strong>of</strong> Lecture Notes in Computer<br />
Science, pages 499–514. Springer, 2002.<br />
[15] R. M. Amadio <strong>and</strong> D. Lugiez. On the reachability problem in cryptographic<br />
protocols. In C. Palamidessi, editor, CONCUR, volume 1877 <strong>of</strong><br />
Lecture Notes in Computer Science, pages 380–394. Springer, 2000.<br />
[16] R. M. Amadio, D. Lugiez, <strong>and</strong> V. Vanackère. On the symbolic reduction<br />
<strong>of</strong> processes with cryptographic functions. Theor. Comput. Sci., 290(1):695–<br />
740, 2003.<br />
[17] A. Arm<strong>and</strong>o, D. A. Basin, M. Bouallagui, Y. Chevalier, L. Compagna,<br />
S. Mödersheim, M. Rusinowitch, M. Turuani, L. Viganò, <strong>and</strong> L. Vigneron.<br />
The aviss security protocol analysis tool. In E. Brinksma <strong>and</strong> K. Guldstr<strong>and</strong><br />
Larsen, editors, CAV, volume 2404 <strong>of</strong> Lecture Notes in Computer<br />
Science, pages 349–353. Springer, 2002.<br />
[18] G. Ateniese <strong>and</strong> B. de Medeiros. A provably secure nyberg-rueppel signature<br />
variant with applications. Technical Report, In Cryptology ePrint<br />
Archive, Report 2004/93, 2004.<br />
[19] AVISPA Tool Set. http://www.avispa-project.org/.<br />
[20] F. Baader. The theory <strong>of</strong> idempotent semigroups is <strong>of</strong> unification type<br />
zero. J. Autom. Reasoning, 2(3):283–286, 1986.<br />
[21] F. Baader <strong>and</strong> T. Nipkow. Term Rewriting <strong>and</strong> All That. Cambridge University<br />
Press, 1998.<br />
[22] F. Baader <strong>and</strong> W. Snyder. Unification theory. In J. A. Robinson <strong>and</strong> A.<br />
Voronkov editors, H<strong>and</strong>book <strong>of</strong> Automated Reasoning, Elsevier <strong>and</strong> MIT Press,<br />
pages 445–532. 2001.<br />
[23] L. Bachmair. Canonical equational pro<strong>of</strong>s. Progress in Theoretical Computer<br />
Science, Birkhauser, 1991.<br />
[24] L. Bachmair <strong>and</strong> H. Ganzinger. On restrictions <strong>of</strong> ordered paramodulation<br />
with simplification. In M. E. Stickel, editor, CADE, volume 449 <strong>of</strong> Lecture<br />
Notes in Computer Science, pages 427–441. Springer, 1990.