Blanchet, B. and A. Podelski: Verification of Cryptographic Protocols: Tagging Enforces Termination. In: Theoretical Computer Science 333, 67-90 (2005).
localid: C1256104005ECAFC-DE831F79824AC81CC1256FC000333894-BlanchetPodelski2005
Abadi, M. and B. Blanchet: Analyzing Security Protocols with Secrecy Types and Logic Programs. In: Journal of the ACM 52, 1, 102-146 (2005).
url: http://doi.acm.org/10.1145/1044731.1044735
localid: C1256BDD001D715B-5F9A04A5291DE21DC1256FB0005164C4-AbadiBlanchet2005
Blanchet, B., M. Abadi and C. Fournet: Automated Verification of Selected Equivalences for Security Protocols. In: 20th IEEE Symposium on Logic in Computer Science (LICS 2005) IEEE, Los Alamitos, USA (2005) 331-340.
localid: C1256BDD001D715B-4ED43191DFA60AA9C1256FCB0047F288-BlanchetAbadiFournet2005
Abadi, M. and B. Blanchet: Computer-Assisted Verification of a Protocol for Certified Email. In: Science of Computer Programming 58, 1-2, 3-27 (2005).
localid: C1256BDD001D715B-205C31DE36FEC244C1256FB00052677D-AbadiBlanchet2005b
Allamigeon, X. and B. Blanchet: Reconstruction of Attacks against Cryptographic Protocols. In: 18th IEEE Computer Security Foundations Workshop (CSFW-18) IEEE, Los Alamitos, USA (2005) 140-154.
localid: C1256BDD001D715B-79D6998A96BE643EC1256FC20036DDA2-AllamigeonBlanchet2005
Blanchet, B. and A. Podelski: Verification of Cryptographic Protocols: Tagging Enforces Termination. In: Theoretical Computer Science 333, 1-2, 67-90 (2005).
url: http://dx.doi.org/10.1016/j.tcs.2004.10.018
localid: C1256BDD001D715B-493A49D4190D93BCC1256FB00051F267-BlanchetPodelski2005
Blanchet, B.: Automatic Proof of Strong Secrecy for Security Protocols. NWG 1 - Blanchet, Stuhlsatzenhausweg 85, 66123 Saarbr├╝cken, Germany (2004).
Blanchet, B.: Automatic Proof of Strong Secrecy for Security Protocols. In: 2004 IEEE Symposium on Security and Privacy IEEE, Piscataway, USA (2004) 86-100.
localid: C1256BDD001D715B-CF5790F12295ED53C1256E900001A96E-Blanchet2004
Abadi, M., B. Blanchet and C. Fournet: Just Fast {Keying} in the {Pi} Calculus. In: Programming Languages and Systems : 13th European Symposium on Programming (ESOP 2004), (Eds.) Schmidt, David. Lecture Notes in Computer Science. Springer, Berlin, Germany (2004) 340-354.
localid: C1256BDD001D715B-284E4CE5C9F5B245C1256E56005CE7AD-AbadiBlanchetFournet2004
Blanchet, B. and A. Podelski: Verification of Cryptographic Protocols: Tagging Enforces Termination. In: Foundations of software science and computation structures : 6th International Conference, FOSSACS 2003 Lecture Notes in Computer Science. Springer, Berlin, Germany (2003) 136-152.
localid: C1256104005ECAFC-882EFCF8FCEA7F73C1256D0A0030D9D3-BP-Fossacs03
http://edoc.mpg.de
The Max Planck Society does not take any responsibility for the content of this export.