30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY 205<br />

[48] B. Blanchet. Computationally sound mechanized pro<strong>of</strong>s <strong>of</strong> correspondence<br />

assertions. In CSF, pages 97–111. IEEE Computer Society, 2007.<br />

[49] B. Blanchet. Vérification automatique de protocoles cryptographiques :<br />

modèle formel et modèle calculatoire. Mémoire d’habilitation à diriger des<br />

recherches, Université Paris-Dauphine, November 2008.<br />

[50] B. Blanchet, M. Abadi, <strong>and</strong> C. Fournet. Automated verification <strong>of</strong> selected<br />

equivalences for security protocols. In LICS, pages 331–340. IEEE Computer<br />

Society, 2005.<br />

[51] Bruno Blanchet. Automatic pro<strong>of</strong> <strong>of</strong> strong secrecy for security protocols.<br />

In IEEE Symposium on Security <strong>and</strong> Privacy, pages 86–, 2004.<br />

[52] D. Bolignano. Towards the formal verification <strong>of</strong> electronic commerce<br />

protocols. In CSFW, pages 133–147. IEEE Computer Society, 1997.<br />

[53] M. Boreale. Symbolic trace analysis <strong>of</strong> cryptographic protocols. In F. Orejas<br />

<strong>and</strong> P. G. Spirakis <strong>and</strong> J. van Leeuwen editors, ICALP, volume 2076 <strong>of</strong> Lecture<br />

Notes in Computer Science, pages 667–681, Springer, 2001.<br />

[54] M. Boreale <strong>and</strong> M. G. Buscemi. A method for symbolic analysis <strong>of</strong> security<br />

protocols. Theor. Comput. Sci., 338(1-3):393–425, 2005.<br />

[55] R.S. Boyer <strong>and</strong> J.S. Moore. The sharing <strong>of</strong> structure in theorem-proving<br />

programs. In Machine Intelligence, vol. 7, B. Meltzer <strong>and</strong> D. Michie (Eds.).<br />

Edinburgh University Press, Edinburgh, Scotl<strong>and</strong>, pages 101–116, 1972.<br />

[56] E. Bresson, Y. Lakhnech, L. Mazaré, <strong>and</strong> B. Warinschi. A generalization<br />

<strong>of</strong> ddh with applications to protocol analysis <strong>and</strong> computational soundness.<br />

In Alfred Menezes, editor, CRYPTO, volume 4622 <strong>of</strong> Lecture Notes in<br />

Computer Science, pages 482–499. Springer, 2007.<br />

[57] M. Burrows, M. Abadi, <strong>and</strong> R. M. Needham. A logic <strong>of</strong> authentication.<br />

ACM Trans. Comput. Syst., 8(1):18–36, 1990.<br />

[58] S. Bursuc, H. Comon-Lundh, <strong>and</strong> S. Delaune. Associative-commutative<br />

deducibility constraints. In W. Thomas <strong>and</strong> P. Weil, editors, STACS, volume<br />

4393 <strong>of</strong> Lecture Notes in Computer Science, pages 634–645. Springer,<br />

2007.<br />

[59] R. Canetti <strong>and</strong> H. Krawczyk. <strong>Analysis</strong> <strong>of</strong> key-exchange protocols <strong>and</strong><br />

their use for building secure channels. In B. Pfitzmann, editor, EURO-<br />

CRYPT, volume 2045 <strong>of</strong> Lecture Notes in Computer Science, pages 453–474.<br />

Springer, 2001.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!