30.01.2013 Views

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

Logical Analysis and Verification of Cryptographic Protocols - Loria

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

BIBLIOGRAPHY 213<br />

[146] Ch. Lynch. Schematic saturation for decision <strong>and</strong> unification problems. In<br />

F. Baader, editor, CADE, volume 2741 <strong>of</strong> Lecture Notes in Computer Science,<br />

pages 427–441. Springer, 2003.<br />

[147] A. Martelli <strong>and</strong> U. Montanari. An efficient unification algorithm. ACM<br />

Trans. Program. Lang. Syst., 4(2):258–282, 1982.<br />

[148] A. Martelli <strong>and</strong> V. Montanari. Unification in linear time <strong>and</strong> space: A<br />

structured presentation. Internal Rep. B76-16, Ist. di Elaborazione delle Informazione,<br />

Consiglio Nazionale delle Ricerche, Pisa, Italy, July 1976.<br />

[149] S. Mauw, J. Verschuren, <strong>and</strong> E. P. de Vink. Data anonymity in the foo<br />

voting scheme. Electr. Notes Theor. Comput. Sci., 168:5–28, 2007.<br />

[150] D. A. McAllester. Automatic recognition <strong>of</strong> tractability in inference relations.<br />

J. ACM, 40(2):284–303, 1993.<br />

[151] C. Meadows. The nrl protocol analyzer: An overview. J. Log. Program.,<br />

26(2):113–131, 1996.<br />

[152] A. Menezes <strong>and</strong> N. P. Smart. Security <strong>of</strong> signature schemes in a multi-user<br />

setting. Des. Codes Cryptography, 33(3):261–274, 2004.<br />

[153] A. J. Menezes, P. C. Van Oorschot, <strong>and</strong> S. A. Vanstone. H<strong>and</strong>book <strong>of</strong> applied<br />

cryptography, CRC press. 1996.<br />

[154] R. C. Merkle. Secure communications over insecure channels. Commun.<br />

ACM, 21(4):294–299, 1978.<br />

[155] D. Micciancio <strong>and</strong> B. Warinschi. Soundness <strong>of</strong> formal encryption in the<br />

presence <strong>of</strong> active adversaries. In Moni Naor, editor, TCC, volume 2951 <strong>of</strong><br />

Lecture Notes in Computer Science, pages 133–151. Springer, 2004.<br />

[156] J. K. Millen <strong>and</strong> V. Shmatikov. Constraint solving for bounded-process<br />

cryptographic protocol analysis. In ACM Conference on Computer <strong>and</strong> Communications<br />

Security, pages 166–175, 2001.<br />

[157] J. K. Millen <strong>and</strong> V. Shmatikov. Symbolic protocol analysis with an abelian<br />

group operator or diffie-hellman exponentiation. Journal <strong>of</strong> Computer Security,<br />

13(3):515–564, 2005.<br />

[158] R. Milner. Communication <strong>and</strong> concurrency. International Series in Computer<br />

Science, Prentice Hall, 1989.<br />

[159] R. Milner. Communicating <strong>and</strong> mobile systems: the π-calculus. Cambridge<br />

University Press, 1999.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!