Volume 367,
Numbers 1-2,
November 2006
Automated Reasoning for Security Protocol Analysis,
Automated Reasoning for Security Protocol Analysis
Contributions
- Martín Abadi, Véronique Cortier:
Deciding knowledge in security protocols under equational theories.
2-32
Electronic Edition (link) BibTeX
- Michael Backes, Anupam Datta, Ante Derek, John C. Mitchell, Mathieu Turuani:
Compositional analysis of contract-signing protocols.
33-56
Electronic Edition (link) BibTeX
- Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Christopher Walstad:
Formal analysis of Kerberos 5.
57-87
Electronic Edition (link) BibTeX
- Carlos Caleiro, Luca Viganò, David A. Basin:
On the semantics of Alice&Bob specifications of security protocols.
88-122
Electronic Edition (link) BibTeX
- Konstantinos Chatzikokolakis, Catuscia Palamidessi:
Probable innocence revisited.
123-138
Electronic Edition (link) BibTeX
- Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink:
Injective synchronisation: An extension of the authentication hierarchy.
139-161
Electronic Edition (link) BibTeX
- Santiago Escobar, Catherine Meadows, José Meseguer:
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties.
162-202
Electronic Edition (link) BibTeX
- Sebastian Nanz, Chris Hankin:
A framework for security analysis of mobile wireless networks.
203-227
Electronic Edition (link) BibTeX
- Ramaswamy Ramanujam, S. P. Suresh:
A (restricted) quantifier elimination for security protocols.
228-256
Electronic Edition (link) BibTeX
- Graham Steel:
Formal analysis of PIN block attacks.
257-270
Electronic Edition (link) BibTeX
Volume 367,
Number 3,
December 2006
Preface
Fundamental study
Contributions
Copyright © Sun May 17 00:25:10 2009
by Michael Ley (ley@uni-trier.de)