Published in: LIPIcs, Volume 260, 8th International Conference on Formal Structures for Computation and Deduction (FSCD 2023)
Saraid Dwyer Satterfield, Serdar Erbatur, Andrew M. Marshall, and Christophe Ringeissen. Knowledge Problems in Security Protocols: Going Beyond Subterm Convergent Theories. In 8th International Conference on Formal Structures for Computation and Deduction (FSCD 2023). Leibniz International Proceedings in Informatics (LIPIcs), Volume 260, pp. 30:1-30:19, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2023)
@InProceedings{dwyersatterfield_et_al:LIPIcs.FSCD.2023.30, author = {Dwyer Satterfield, Saraid and Erbatur, Serdar and Marshall, Andrew M. and Ringeissen, Christophe}, title = {{Knowledge Problems in Security Protocols: Going Beyond Subterm Convergent Theories}}, booktitle = {8th International Conference on Formal Structures for Computation and Deduction (FSCD 2023)}, pages = {30:1--30:19}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-95977-277-8}, ISSN = {1868-8969}, year = {2023}, volume = {260}, editor = {Gaboardi, Marco and van Raamsdonk, Femke}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.FSCD.2023.30}, URN = {urn:nbn:de:0030-drops-180148}, doi = {10.4230/LIPIcs.FSCD.2023.30}, annote = {Keywords: Term rewriting, security protocols, verification} }
Published in: LIPIcs, Volume 13, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2011)
Céline Chevalier, Stéphanie Delaune, and Steve Kremer. Transforming Password Protocols to Compose. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2011). Leibniz International Proceedings in Informatics (LIPIcs), Volume 13, pp. 204-216, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)
@InProceedings{chevalier_et_al:LIPIcs.FSTTCS.2011.204, author = {Chevalier, C\'{e}line and Delaune, St\'{e}phanie and Kremer, Steve}, title = {{Transforming Password Protocols to Compose}}, booktitle = {IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2011)}, pages = {204--216}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-34-7}, ISSN = {1868-8969}, year = {2011}, volume = {13}, editor = {Chakraborty, Supratik and Kumar, Amit}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2011.204}, URN = {urn:nbn:de:0030-drops-33273}, doi = {10.4230/LIPIcs.FSTTCS.2011.204}, annote = {Keywords: Security, cryptographic protocols, composition} }
Published in: LIPIcs, Volume 4, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (2009)
Stéphanie Delaune, Steve Kremer, and Olivier Pereira. Simulation based security in the applied pi calculus. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. Leibniz International Proceedings in Informatics (LIPIcs), Volume 4, pp. 169-180, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{delaune_et_al:LIPIcs.FSTTCS.2009.2316, author = {Delaune, St\'{e}phanie and Kremer, Steve and Pereira, Olivier}, title = {{Simulation based security in the applied pi calculus}}, booktitle = {IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science}, pages = {169--180}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-13-2}, ISSN = {1868-8969}, year = {2009}, volume = {4}, editor = {Kannan, Ravi and Narayan Kumar, K.}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2009.2316}, URN = {urn:nbn:de:0030-drops-23163}, doi = {10.4230/LIPIcs.FSTTCS.2009.2316}, annote = {Keywords: Simulation based security, applied pi calculus, joint state theorem, authentication protocols} }
Published in: Dagstuhl Seminar Proceedings, Volume 7421, Formal Protocol Verification Applied (2008)
Liqun Chen, Steve Kremer, and Mark D. Ryan. 07421 Abstracts Collection – Formal Protocol Verification Applied. In Formal Protocol Verification Applied. Dagstuhl Seminar Proceedings, Volume 7421, pp. 1-13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{chen_et_al:DagSemProc.07421.1, author = {Chen, Liqun and Kremer, Steve and Ryan, Mark D.}, title = {{07421 Abstracts Collection – Formal Protocol Verification Applied}}, booktitle = {Formal Protocol Verification Applied}, pages = {1--13}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7421}, editor = {Liqun Chen and Steve Kremer and Mark D. Ryan}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07421.1}, URN = {urn:nbn:de:0030-drops-14196}, doi = {10.4230/DagSemProc.07421.1}, annote = {Keywords: Security protocols, formal verification, trusted computing, biometrics, security of mobile computing, electronic voting, payment systems} }
Published in: Dagstuhl Seminar Proceedings, Volume 7421, Formal Protocol Verification Applied (2008)
Liqun Chen, Steve Kremer, and Mark D. Ryan. 07421 Executive Summary – Formal Protocol Verification Applied. In Formal Protocol Verification Applied. Dagstuhl Seminar Proceedings, Volume 7421, pp. 1-2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{chen_et_al:DagSemProc.07421.2, author = {Chen, Liqun and Kremer, Steve and Ryan, Mark D.}, title = {{07421 Executive Summary – Formal Protocol Verification Applied}}, booktitle = {Formal Protocol Verification Applied}, pages = {1--2}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7421}, editor = {Liqun Chen and Steve Kremer and Mark D. Ryan}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07421.2}, URN = {urn:nbn:de:0030-drops-14186}, doi = {10.4230/DagSemProc.07421.2}, annote = {Keywords: Security protocols, formal verification, trusted computing, biometrics, security of mobile computing, electronic voting, payment systems} }
Published in: Dagstuhl Seminar Proceedings, Volume 7421, Formal Protocol Verification Applied (2008)
Cas Cremers. Complete Characterization of Security Protocols by Pattern Refinement. In Formal Protocol Verification Applied. Dagstuhl Seminar Proceedings, Volume 7421, pp. 1-11, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{cremers:DagSemProc.07421.3, author = {Cremers, Cas}, title = {{Complete Characterization of Security Protocols by Pattern Refinement}}, booktitle = {Formal Protocol Verification Applied}, pages = {1--11}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7421}, editor = {Liqun Chen and Steve Kremer and Mark D. Ryan}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07421.3}, URN = {urn:nbn:de:0030-drops-14173}, doi = {10.4230/DagSemProc.07421.3}, annote = {Keywords: Security protocols, Formal analysis, Verification, Tools} }
Published in: Dagstuhl Seminar Proceedings, Volume 7421, Formal Protocol Verification Applied (2008)
Michael Backes, Matteo Maffei, and Dominique Unruh. Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol. In Formal Protocol Verification Applied. Dagstuhl Seminar Proceedings, Volume 7421, pp. 1-43, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{backes_et_al:DagSemProc.07421.4, author = {Backes, Michael and Maffei, Matteo and Unruh, Dominique}, title = {{Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol}}, booktitle = {Formal Protocol Verification Applied}, pages = {1--43}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7421}, editor = {Liqun Chen and Steve Kremer and Mark D. Ryan}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops-dev.dagstuhl.de/entities/document/10.4230/DagSemProc.07421.4}, URN = {urn:nbn:de:0030-drops-14153}, doi = {10.4230/DagSemProc.07421.4}, annote = {Keywords: Language-based security, zero-knowledge proofs, applied pi-calculus, direct anonymous attestation} }
Feedback for Dagstuhl Publishing