Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
BIBLIOGRAPHY 205<br />
[48] B. Blanchet. Computationally sound mechanized pro<strong>of</strong>s <strong>of</strong> correspondence<br />
assertions. In CSF, pages 97–111. IEEE Computer Society, 2007.<br />
[49] B. Blanchet. Vérification automatique de protocoles cryptographiques :<br />
modèle formel et modèle calculatoire. Mémoire d’habilitation à diriger des<br />
recherches, Université Paris-Dauphine, November 2008.<br />
[50] B. Blanchet, M. Abadi, <strong>and</strong> C. Fournet. Automated verification <strong>of</strong> selected<br />
equivalences for security protocols. In LICS, pages 331–340. IEEE Computer<br />
Society, 2005.<br />
[51] Bruno Blanchet. Automatic pro<strong>of</strong> <strong>of</strong> strong secrecy for security protocols.<br />
In IEEE Symposium on Security <strong>and</strong> Privacy, pages 86–, 2004.<br />
[52] D. Bolignano. Towards the formal verification <strong>of</strong> electronic commerce<br />
protocols. In CSFW, pages 133–147. IEEE Computer Society, 1997.<br />
[53] M. Boreale. Symbolic trace analysis <strong>of</strong> cryptographic protocols. In F. Orejas<br />
<strong>and</strong> P. G. Spirakis <strong>and</strong> J. van Leeuwen editors, ICALP, volume 2076 <strong>of</strong> Lecture<br />
Notes in Computer Science, pages 667–681, Springer, 2001.<br />
[54] M. Boreale <strong>and</strong> M. G. Buscemi. A method for symbolic analysis <strong>of</strong> security<br />
protocols. Theor. Comput. Sci., 338(1-3):393–425, 2005.<br />
[55] R.S. Boyer <strong>and</strong> J.S. Moore. The sharing <strong>of</strong> structure in theorem-proving<br />
programs. In Machine Intelligence, vol. 7, B. Meltzer <strong>and</strong> D. Michie (Eds.).<br />
Edinburgh University Press, Edinburgh, Scotl<strong>and</strong>, pages 101–116, 1972.<br />
[56] E. Bresson, Y. Lakhnech, L. Mazaré, <strong>and</strong> B. Warinschi. A generalization<br />
<strong>of</strong> ddh with applications to protocol analysis <strong>and</strong> computational soundness.<br />
In Alfred Menezes, editor, CRYPTO, volume 4622 <strong>of</strong> Lecture Notes in<br />
Computer Science, pages 482–499. Springer, 2007.<br />
[57] M. Burrows, M. Abadi, <strong>and</strong> R. M. Needham. A logic <strong>of</strong> authentication.<br />
ACM Trans. Comput. Syst., 8(1):18–36, 1990.<br />
[58] S. Bursuc, H. Comon-Lundh, <strong>and</strong> S. Delaune. Associative-commutative<br />
deducibility constraints. In W. Thomas <strong>and</strong> P. Weil, editors, STACS, volume<br />
4393 <strong>of</strong> Lecture Notes in Computer Science, pages 634–645. Springer,<br />
2007.<br />
[59] R. Canetti <strong>and</strong> H. Krawczyk. <strong>Analysis</strong> <strong>of</strong> key-exchange protocols <strong>and</strong><br />
their use for building secure channels. In B. Pfitzmann, editor, EURO-<br />
CRYPT, volume 2045 <strong>of</strong> Lecture Notes in Computer Science, pages 453–474.<br />
Springer, 2001.