The CL-Atse Protocol Analyser
- 1 January 2006
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 277-286
- https://doi.org/10.1007/11805618_21
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- OFMC: A symbolic model checker for security protocolsInternational Journal of Information Security, 2005
- An Optimized Intruder Model for SAT-based Model-Checking of Security ProtocolsElectronic Notes in Theoretical Computer Science, 2005
- The AVISPA Tool for the Automated Validation of Internet Security Protocols and ApplicationsLecture Notes in Computer Science, 2005
- An NP decision procedure for protocol insecurity with XORPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On the symbolic reduction of processes with cryptographic functionsTheoretical Computer Science, 2003
- Deciding the Security of Protocols with Diffie-Hellman Exponentiation and Products in ExponentsLecture Notes in Computer Science, 2003
- An Improved Constraint-Based System for the Verification of Security ProtocolsLecture Notes in Computer Science, 2002
- Symbolic Trace Analysis of Cryptographic ProtocolsLecture Notes in Computer Science, 2001
- Unification in the Union of Disjoint Equational Theories: Combining Decision ProceduresJournal of Symbolic Computation, 1996
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983