no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
|
Armando, Alessandro |
|
2005 |
125 |
1 |
p. 91-108 18 p. |
article |
2 |
Attacking Group Multicast Key Management Protocols Using Coral
|
Steel, Graham |
|
2005 |
125 |
1 |
p. 125-144 20 p. |
article |
3 |
Believing the Integrity of a System
|
Foley, Simon N. |
|
2005 |
125 |
1 |
p. 3-12 10 p. |
article |
4 |
Deciding the Security of Protocols with Commuting Public Key Encryption
|
Chevalier, Yannick |
|
2005 |
125 |
1 |
p. 55-66 12 p. |
article |
5 |
Extending Security Protocol Analysis: New Challenges
|
Bond, Mike |
|
2005 |
125 |
1 |
p. 13-24 12 p. |
article |
6 |
Metareasoning about Security Protocols using Distributed Temporal Logic
|
Caleiro, Carlos |
|
2005 |
125 |
1 |
p. 67-89 23 p. |
article |
7 |
On the Relative Soundness of the Free Algebra Model for Public Key Encryption
|
Lynch, Christopher |
|
2005 |
125 |
1 |
p. 43-54 12 p. |
article |
8 |
Preface
|
Armando, Alessandro |
|
2005 |
125 |
1 |
p. 1- 1 p. |
article |
9 |
Satisfiability of Dolev-Yao Constraints
|
Mazaré, Laurent |
|
2005 |
125 |
1 |
p. 109-124 16 p. |
article |
10 |
Synthesising Efficient and Effective Security Protocols
|
Hao, Chen |
|
2005 |
125 |
1 |
p. 25-41 17 p. |
article |
11 |
The ASW Protocol Revisited: A Unified View
|
Hankes Drielsma, Paul |
|
2005 |
125 |
1 |
p. 145-161 17 p. |
article |