Published in: Dagstuhl Reports, Volume 1, Issue 8 (2011)
Hubert Comom-Lundh, Ralf Küsters, and Catherine Meadows. Security and Rewriting (Dagstuhl Seminar 11332). In Dagstuhl Reports, Volume 1, Issue 8, pp. 53-66, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)
@Article{comomlundh_et_al:DagRep.1.8.53, author = {Comom-Lundh, Hubert and K\"{u}sters, Ralf and Meadows, Catherine}, title = {{Security and Rewriting (Dagstuhl Seminar 11332)}}, pages = {53--66}, journal = {Dagstuhl Reports}, ISSN = {2192-5283}, year = {2011}, volume = {1}, number = {8}, editor = {Comom-Lundh, Hubert and K\"{u}sters, Ralf and Meadows, Catherine}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagRep.1.8.53}, URN = {urn:nbn:de:0030-drops-33111}, doi = {10.4230/DagRep.1.8.53}, annote = {Keywords: Rewriting, Security, Access Control, Protocol Verification} }
Published in: LIPIcs, Volume 9, 28th International Symposium on Theoretical Aspects of Computer Science (STACS 2011)
Hubert Comon-Lundh and Véronique Cortier. How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.. In 28th International Symposium on Theoretical Aspects of Computer Science (STACS 2011). Leibniz International Proceedings in Informatics (LIPIcs), Volume 9, pp. 29-44, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)
@InProceedings{comonlundh_et_al:LIPIcs.STACS.2011.29, author = {Comon-Lundh, Hubert and Cortier, V\'{e}ronique}, title = {{How to prove security of communication protocols? A discussion on the soundness of formal models w.r.t. computational ones.}}, booktitle = {28th International Symposium on Theoretical Aspects of Computer Science (STACS 2011)}, pages = {29--44}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-25-5}, ISSN = {1868-8969}, year = {2011}, volume = {9}, editor = {Schwentick, Thomas and D\"{u}rr, Christoph}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.STACS.2011.29}, URN = {urn:nbn:de:0030-drops-29993}, doi = {10.4230/LIPIcs.STACS.2011.29}, annote = {Keywords: verification, security, cryptography} }
Published in: LIPIcs, Volume 2, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (2008)
Ramesh Hariharan, Madhavan Mukund, and V Vinay. 2008 Preface -- IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. Leibniz International Proceedings in Informatics (LIPIcs), Volume 2, p. -1, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{hariharan_et_al:LIPIcs.FSTTCS.2008.1771, author = {Hariharan, Ramesh and Mukund, Madhavan and Vinay, V}, title = {{2008 Preface -- IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science}}, booktitle = {IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science}, pages = {-1---1}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-08-8}, ISSN = {1868-8969}, year = {2008}, volume = {2}, editor = {Hariharan, Ramesh and Mukund, Madhavan and Vinay, V}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2008.1771}, URN = {urn:nbn:de:0030-drops-17713}, doi = {10.4230/LIPIcs.FSTTCS.2008.1771}, annote = {Keywords: Preface} }
Published in: LIPIcs, Volume 2, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (2008)
Hubert Comon-Lundh. About models of security protocols. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. Leibniz International Proceedings in Informatics (LIPIcs), Volume 2, pp. 352-356, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{comonlundh:LIPIcs.FSTTCS.2008.1766, author = {Comon-Lundh, Hubert}, title = {{About models of security protocols}}, booktitle = {IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science}, pages = {352--356}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-08-8}, ISSN = {1868-8969}, year = {2008}, volume = {2}, editor = {Hariharan, Ramesh and Mukund, Madhavan and Vinay, V}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2008.1766}, URN = {urn:nbn:de:0030-drops-17662}, doi = {10.4230/LIPIcs.FSTTCS.2008.1766}, annote = {Keywords: Protocols, security, concurrency, formal methods} }
Feedback for Dagstuhl Publishing