×

Found 11 Documents (Results 1–11)

SAT-based verification of security protocols via translation to networks of automata. (English) Zbl 1196.68140

Edelkamp, Stefan (ed.) et al., Model checking and artificial intelligence. 4th workshop, MoChArt IV, Riva del Garda, Italy, August 29, 2006. Revised selected and invited papers. Berlin: Springer (ISBN 978-3-540-74127-5/pbk). Lecture Notes in Computer Science 4428. Lecture Notes in Artificial Intelligence, 146-165 (2007).
MSC:  68Q60 68M12 94A62
Full Text: DOI

Attacking a protocol for group key agreement by refuting incorrect inductive conjectures. (English) Zbl 1126.68579

Basin, David (ed.) et al., Automated reasoning. Second international joint conference, IJCAR 2004, Cork, Ireland, July 4–8, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22345-2/pbk). Lecture Notes in Computer Science 3097. Lecture Notes in Artificial Intelligence, 137-151 (2004).
MSC:  68T15 94A60
Full Text: DOI

New decidability results for fragments of first-order logic and application to cryptographic protocols. (English) Zbl 1038.03012

Nieuwenhuis, Robert (ed.), Rewriting techniques and applications. 14th international conference, RTA 2003, Valencia, Spain, June 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40254-3/pbk). Lect. Notes Comput. Sci. 2706, 148-164 (2003).

Verification of authentication protocols based on the binding relation. (English) Zbl 1033.94558

Okada, Mitsuhiro (ed.) et al., Software security – theories and systems. Mext-NSF-JSPS international symposium, ISSS 2002, Tokyo, Japan, November 8–10, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00708-3/pbk). Lect. Notes Comput. Sci. 2609, 299-316 (2003).
MSC:  94A62 68P25

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

all top 3

Software