Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
BIBLIOGRAPHY 207<br />
[72] Y. Chevalier, D. Lugiez, <strong>and</strong> M. Rusinowitch. Towards an automatic analysis<br />
<strong>of</strong> web service security. In B. Konev <strong>and</strong> F. Wolter, editors, FroCos,<br />
volume 4720 <strong>of</strong> Lecture Notes in Computer Science, pages 133–147. Springer,<br />
2007.<br />
[73] Y. Chevalier <strong>and</strong> M. Rusinowitch. Combining intruder theories. In L.<br />
Caires <strong>and</strong> G. F. Italiano <strong>and</strong> L. Monteiro <strong>and</strong> C. Palamidessi <strong>and</strong> M. Yung editors,<br />
ICALP, volume 3580 <strong>of</strong> Lecture Notes in Computer Science, pages 639–<br />
651, 2005.<br />
[74] Y. Chevalier <strong>and</strong> M. Rusinowitch. Hierarchical combination <strong>of</strong> intruder<br />
theories. In F. Pfenning, editor, RTA, volume 4098 <strong>of</strong> Lecture Notes in Computer<br />
Science, pages 108–122. Springer, 2006.<br />
[75] Y. Chevalier <strong>and</strong> L. Vigneron. A tool for lazy verification <strong>of</strong> security protocols.<br />
In ASE, pages 373–376. IEEE Computer Society, 2001.<br />
[76] B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern, <strong>and</strong> J. Traore.<br />
On Some Incompatible Properties <strong>of</strong> Voting Schemes. In WOTE’06: Proceedings<br />
<strong>of</strong> the International Association for Voting Systems Sciences Workshop<br />
on Trustworthy Elections, 2006.<br />
[77] T. Chothia, S. Orzan, J. Pang, <strong>and</strong> M. Torabi Dashti. A framework for<br />
automatically checking anonymity with mu crl. In U. Montanari, D. Sannella,<br />
<strong>and</strong> R. Bruni, editors, TGC, volume 4661 <strong>of</strong> Lecture Notes in Computer<br />
Science, pages 301–318. Springer, 2006.<br />
[78] J. Clark <strong>and</strong> J. Jacob. A survey <strong>of</strong> authentication protocol literature.<br />
November 1997.<br />
[79] E. M. Clarke, S. Jha, <strong>and</strong> W. R. Marrero. Verifying security protocols with<br />
brutus. ACM Trans. S<strong>of</strong>tw. Eng. Methodol., 9(4):443–487, 2000.<br />
[80] H. Comon-Lundh. Intruder theories (ongoing work). In I. Walukiewicz,<br />
editor, FoSSaCS, volume 2987 <strong>of</strong> Lecture Notes in Computer Science, pages<br />
1–4. Springer, 2004.<br />
[81] H. comon Lundh <strong>and</strong> V. Cortier. Tree automata with one memory, set<br />
constraints <strong>and</strong> cryptographic protocols. Research Report, LSV-01-13, Laboratoire<br />
Spécification et Vérification, ENS de Cachan, France, 2001.<br />
[82] H. Comon-Lundh <strong>and</strong> V. Cortier. Security properties: Two agents are<br />
sufficient. In P. Degano, editor, ESOP, volume 2618 <strong>of</strong> Lecture Notes in<br />
Computer Science, pages 99–113. Springer, 2003.