Home News About Us Contact Contributors Disclaimer Privacy Policy Help FAQ

Home
Search
Quick Search
Advanced
Fulltext
Browse
Collections
Persons
My eDoc
Session History
Login
Name:
Password:
Documentation
Help
Support Wiki
Direct access to
document ID:


          Display Documents


Institute:
Collection:
Print in Citation style Print version     Display:
Sort by: Display records with Fulltext only
Entries: 1-10  
 Basket 
Verification of Cryptographic Protocols: Tagging Enforces Termination
Authors: Blanchet, Bruno; Podelski, Andreas
Date of Publication (YYYY-MM-DD): 2005
Title of Journal: Theoretical Computer Science
Volume: 333
Start Page: 67
End Page: 90
Document Type: Article
ID: 279106.0
Analyzing Security Protocols with Secrecy Types and Logic Programs
Authors: Abadi, Martín; Blanchet, Bruno
Date of Publication (YYYY-MM-DD): 2005
Title of Journal: Journal of the ACM
Volume: 52
Issue / Number: 1
Start Page: 102
End Page: 146
Document Type: Article
ID: 520662.0
Automated Verification of Selected Equivalences for Security Protocols
Authors: Blanchet, Bruno; Abadi, Martín; Fournet, Cédric
Place of Publication: Los Alamitos, USA
Publisher: IEEE
Date of Publication (YYYY-MM-DD): 2005
Title of Proceedings: 20th IEEE Symposium on Logic in Computer Science (LICS 2005)
Start Page: 331
End Page: 340
Document Type: Conference-Paper
ID: 520666.0
Computer-Assisted Verification of a Protocol for Certified Email
Authors: Abadi, Martín; Blanchet, Bruno
Date of Publication (YYYY-MM-DD): 2005
Title of Journal: Science of Computer Programming
Volume: 58
Issue / Number: 1-2
Start Page: 3
End Page: 27
Document Type: Article
ID: 520664.0
Reconstruction of Attacks against Cryptographic Protocols
Authors: Allamigeon, Xavier; Blanchet, Bruno
Place of Publication: Los Alamitos, USA
Publisher: IEEE
Date of Publication (YYYY-MM-DD): 2005
Title of Proceedings: 18th IEEE Computer Security Foundations Workshop (CSFW-18)
Start Page: 140
End Page: 154
Document Type: Conference-Paper
ID: 520665.0
Verification of Cryptographic Protocols: Tagging Enforces Termination
Authors: Blanchet, Bruno; Podelski, Andreas
Date of Publication (YYYY-MM-DD): 2005
Title of Journal: Theoretical Computer Science
Volume: 333
Issue / Number: 1-2
Start Page: 67
End Page: 90
Document Type: Article
ID: 520663.0
Automatic Proof of Strong Secrecy for Security Protocols
Authors: Blanchet, Bruno
Place of Publication: Stuhlsatzenhausweg 85, 66123 Saarbrücken, Germany
Publisher: NWG 1 - Blanchet
Date of Publication (YYYY-MM-DD): 2004
Document Type: Report
ID: 520667.0
Automatic Proof of Strong Secrecy for Security Protocols
Authors: Blanchet, Bruno
Place of Publication: Piscataway, USA
Publisher: IEEE
Date of Publication (YYYY-MM-DD): 2004
Title of Proceedings: 2004 IEEE Symposium on Security and Privacy
Start Page: 86
End Page: 100
Document Type: Conference-Paper
ID: 520661.0
Just Fast {Keying} in the {Pi} Calculus
Authors: Abadi, Martín; Blanchet, Bruno; Fournet, Cédric
Place of Publication: Berlin, Germany
Publisher: Springer
Date of Publication (YYYY-MM-DD): 2004
Title of Proceedings: Programming Languages and Systems : 13th European Symposium on Programming (ESOP 2004)
Start Page: 340
End Page: 354
Title of Series: Lecture Notes in Computer Science
Document Type: Conference-Paper
ID: 520660.0
Verification of Cryptographic Protocols: Tagging Enforces Termination
Editors: Gordon, Andrew D.
Authors: Blanchet, Bruno; Podelski, Andreas
Place of Publication: Berlin, Germany
Publisher: Springer
Date of Publication (YYYY-MM-DD): 2003
Title of Proceedings: Foundations of software science and computation structures : 6th International Conference, FOSSACS 2003
Start Page: 136
End Page: 152
Title of Series: Lecture Notes in Computer Science
Document Type: Conference-Paper
ID: 201983.0
Entries: 1-10  
The scope and number of records on eDoc is subject to the collection policies defined by each institute - see "info" button in the collection browse view.