Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Logical Analysis and Verification of Cryptographic Protocols - Loria
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
BIBLIOGRAPHY 213<br />
[146] Ch. Lynch. Schematic saturation for decision <strong>and</strong> unification problems. In<br />
F. Baader, editor, CADE, volume 2741 <strong>of</strong> Lecture Notes in Computer Science,<br />
pages 427–441. Springer, 2003.<br />
[147] A. Martelli <strong>and</strong> U. Montanari. An efficient unification algorithm. ACM<br />
Trans. Program. Lang. Syst., 4(2):258–282, 1982.<br />
[148] A. Martelli <strong>and</strong> V. Montanari. Unification in linear time <strong>and</strong> space: A<br />
structured presentation. Internal Rep. B76-16, Ist. di Elaborazione delle Informazione,<br />
Consiglio Nazionale delle Ricerche, Pisa, Italy, July 1976.<br />
[149] S. Mauw, J. Verschuren, <strong>and</strong> E. P. de Vink. Data anonymity in the foo<br />
voting scheme. Electr. Notes Theor. Comput. Sci., 168:5–28, 2007.<br />
[150] D. A. McAllester. Automatic recognition <strong>of</strong> tractability in inference relations.<br />
J. ACM, 40(2):284–303, 1993.<br />
[151] C. Meadows. The nrl protocol analyzer: An overview. J. Log. Program.,<br />
26(2):113–131, 1996.<br />
[152] A. Menezes <strong>and</strong> N. P. Smart. Security <strong>of</strong> signature schemes in a multi-user<br />
setting. Des. Codes Cryptography, 33(3):261–274, 2004.<br />
[153] A. J. Menezes, P. C. Van Oorschot, <strong>and</strong> S. A. Vanstone. H<strong>and</strong>book <strong>of</strong> applied<br />
cryptography, CRC press. 1996.<br />
[154] R. C. Merkle. Secure communications over insecure channels. Commun.<br />
ACM, 21(4):294–299, 1978.<br />
[155] D. Micciancio <strong>and</strong> B. Warinschi. Soundness <strong>of</strong> formal encryption in the<br />
presence <strong>of</strong> active adversaries. In Moni Naor, editor, TCC, volume 2951 <strong>of</strong><br />
Lecture Notes in Computer Science, pages 133–151. Springer, 2004.<br />
[156] J. K. Millen <strong>and</strong> V. Shmatikov. Constraint solving for bounded-process<br />
cryptographic protocol analysis. In ACM Conference on Computer <strong>and</strong> Communications<br />
Security, pages 166–175, 2001.<br />
[157] J. K. Millen <strong>and</strong> V. Shmatikov. Symbolic protocol analysis with an abelian<br />
group operator or diffie-hellman exponentiation. Journal <strong>of</strong> Computer Security,<br />
13(3):515–564, 2005.<br />
[158] R. Milner. Communication <strong>and</strong> concurrency. International Series in Computer<br />
Science, Prentice Hall, 1989.<br />
[159] R. Milner. Communicating <strong>and</strong> mobile systems: the π-calculus. Cambridge<br />
University Press, 1999.