30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY 207<br />

[72] Y. Chevalier, D. Lugiez, <strong>and</strong> M. Rusinowitch. Towards an automatic analysis<br />

<strong>of</strong> web service security. In B. Konev <strong>and</strong> F. Wolter, editors, FroCos,<br />

volume 4720 <strong>of</strong> Lecture Notes in Computer Science, pages 133–147. Springer,<br />

2007.<br />

[73] Y. Chevalier <strong>and</strong> M. Rusinowitch. Combining intruder theories. In L.<br />

Caires <strong>and</strong> G. F. Italiano <strong>and</strong> L. Monteiro <strong>and</strong> C. Palamidessi <strong>and</strong> M. Yung editors,<br />

ICALP, volume 3580 <strong>of</strong> Lecture Notes in Computer Science, pages 639–<br />

651, 2005.<br />

[74] Y. Chevalier <strong>and</strong> M. Rusinowitch. Hierarchical combination <strong>of</strong> intruder<br />

theories. In F. Pfenning, editor, RTA, volume 4098 <strong>of</strong> Lecture Notes in Computer<br />

Science, pages 108–122. Springer, 2006.<br />

[75] Y. Chevalier <strong>and</strong> L. Vigneron. A tool for lazy verification <strong>of</strong> security protocols.<br />

In ASE, pages 373–376. IEEE Computer Society, 2001.<br />

[76] B. Chevallier-Mames, P.A. Fouque, D. Pointcheval, J. Stern, <strong>and</strong> J. Traore.<br />

On Some Incompatible Properties <strong>of</strong> Voting Schemes. In WOTE’06: Proceedings<br />

<strong>of</strong> the International Association for Voting Systems Sciences Workshop<br />

on Trustworthy Elections, 2006.<br />

[77] T. Chothia, S. Orzan, J. Pang, <strong>and</strong> M. Torabi Dashti. A framework for<br />

automatically checking anonymity with mu crl. In U. Montanari, D. Sannella,<br />

<strong>and</strong> R. Bruni, editors, TGC, volume 4661 <strong>of</strong> Lecture Notes in Computer<br />

Science, pages 301–318. Springer, 2006.<br />

[78] J. Clark <strong>and</strong> J. Jacob. A survey <strong>of</strong> authentication protocol literature.<br />

November 1997.<br />

[79] E. M. Clarke, S. Jha, <strong>and</strong> W. R. Marrero. Verifying security protocols with<br />

brutus. ACM Trans. S<strong>of</strong>tw. Eng. Methodol., 9(4):443–487, 2000.<br />

[80] H. Comon-Lundh. Intruder theories (ongoing work). In I. Walukiewicz,<br />

editor, FoSSaCS, volume 2987 <strong>of</strong> Lecture Notes in Computer Science, pages<br />

1–4. Springer, 2004.<br />

[81] H. comon Lundh <strong>and</strong> V. Cortier. Tree automata with one memory, set<br />

constraints <strong>and</strong> cryptographic protocols. Research Report, LSV-01-13, Laboratoire<br />

Spécification et Vérification, ENS de Cachan, France, 2001.<br />

[82] H. Comon-Lundh <strong>and</strong> V. Cortier. Security properties: Two agents are<br />

sufficient. In P. Degano, editor, ESOP, volume 2618 <strong>of</strong> Lecture Notes in<br />

Computer Science, pages 99–113. Springer, 2003.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!