Published in: LIPIcs, Volume 13, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2011)
Céline Chevalier, Stéphanie Delaune, and Steve Kremer. Transforming Password Protocols to Compose. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2011). Leibniz International Proceedings in Informatics (LIPIcs), Volume 13, pp. 204-216, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2011)
@InProceedings{chevalier_et_al:LIPIcs.FSTTCS.2011.204, author = {Chevalier, C\'{e}line and Delaune, St\'{e}phanie and Kremer, Steve}, title = {{Transforming Password Protocols to Compose}}, booktitle = {IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2011)}, pages = {204--216}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-34-7}, ISSN = {1868-8969}, year = {2011}, volume = {13}, editor = {Chakraborty, Supratik and Kumar, Amit}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2011.204}, URN = {urn:nbn:de:0030-drops-33273}, doi = {10.4230/LIPIcs.FSTTCS.2011.204}, annote = {Keywords: Security, cryptographic protocols, composition} }
Published in: LIPIcs, Volume 4, IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (2009)
Stéphanie Delaune, Steve Kremer, and Olivier Pereira. Simulation based security in the applied pi calculus. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. Leibniz International Proceedings in Informatics (LIPIcs), Volume 4, pp. 169-180, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2009)
@InProceedings{delaune_et_al:LIPIcs.FSTTCS.2009.2316, author = {Delaune, St\'{e}phanie and Kremer, Steve and Pereira, Olivier}, title = {{Simulation based security in the applied pi calculus}}, booktitle = {IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science}, pages = {169--180}, series = {Leibniz International Proceedings in Informatics (LIPIcs)}, ISBN = {978-3-939897-13-2}, ISSN = {1868-8969}, year = {2009}, volume = {4}, editor = {Kannan, Ravi and Narayan Kumar, K.}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2009.2316}, URN = {urn:nbn:de:0030-drops-23163}, doi = {10.4230/LIPIcs.FSTTCS.2009.2316}, annote = {Keywords: Simulation based security, applied pi calculus, joint state theorem, authentication protocols} }
Published in: Dagstuhl Seminar Proceedings, Volume 7421, Formal Protocol Verification Applied (2008)
Liqun Chen, Steve Kremer, and Mark D. Ryan. 07421 Abstracts Collection – Formal Protocol Verification Applied. In Formal Protocol Verification Applied. Dagstuhl Seminar Proceedings, Volume 7421, pp. 1-13, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{chen_et_al:DagSemProc.07421.1, author = {Chen, Liqun and Kremer, Steve and Ryan, Mark D.}, title = {{07421 Abstracts Collection – Formal Protocol Verification Applied}}, booktitle = {Formal Protocol Verification Applied}, pages = {1--13}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7421}, editor = {Liqun Chen and Steve Kremer and Mark D. Ryan}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07421.1}, URN = {urn:nbn:de:0030-drops-14196}, doi = {10.4230/DagSemProc.07421.1}, annote = {Keywords: Security protocols, formal verification, trusted computing, biometrics, security of mobile computing, electronic voting, payment systems} }
Published in: Dagstuhl Seminar Proceedings, Volume 7421, Formal Protocol Verification Applied (2008)
Liqun Chen, Steve Kremer, and Mark D. Ryan. 07421 Executive Summary – Formal Protocol Verification Applied. In Formal Protocol Verification Applied. Dagstuhl Seminar Proceedings, Volume 7421, pp. 1-2, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008)
@InProceedings{chen_et_al:DagSemProc.07421.2, author = {Chen, Liqun and Kremer, Steve and Ryan, Mark D.}, title = {{07421 Executive Summary – Formal Protocol Verification Applied}}, booktitle = {Formal Protocol Verification Applied}, pages = {1--2}, series = {Dagstuhl Seminar Proceedings (DagSemProc)}, ISSN = {1862-4405}, year = {2008}, volume = {7421}, editor = {Liqun Chen and Steve Kremer and Mark D. Ryan}, publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik}, address = {Dagstuhl, Germany}, URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagSemProc.07421.2}, URN = {urn:nbn:de:0030-drops-14186}, doi = {10.4230/DagSemProc.07421.2}, annote = {Keywords: Security protocols, formal verification, trusted computing, biometrics, security of mobile computing, electronic voting, payment systems} }
Feedback for Dagstuhl Publishing