default search action
Search dblp for Publications
export results for "stream:conf/arspa:"
@proceedings{DBLP:conf/ifip1-7/2010wits, editor = {Alessandro Armando and Gavin Lowe}, title = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16074-5}, doi = {10.1007/978-3-642-16074-5}, isbn = {978-3-642-16073-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BugliesiCM10, author = {Michele Bugliesi and Stefano Calzavara and Damiano Macedonio}, editor = {Alessandro Armando and Gavin Lowe}, title = {Secrecy and Authenticity Types for Secure Distributed Messaging}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {23--40}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_3}, doi = {10.1007/978-3-642-16074-5\_3}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BugliesiCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BugliesiM10, author = {Michele Bugliesi and Paolo Modesti}, editor = {Alessandro Armando and Gavin Lowe}, title = {AnBx - Security Protocols Design and Verification}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {164--184}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_12}, doi = {10.1007/978-3-642-16074-5\_12}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BugliesiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CentenaroF10, author = {Matteo Centenaro and Riccardo Focardi}, editor = {Alessandro Armando and Gavin Lowe}, title = {Match It or Die: Proving Integrity by Equality}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {130--145}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_10}, doi = {10.1007/978-3-642-16074-5\_10}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CentenaroF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CostaDM10, author = {Gabriele Costa and Pierpaolo Degano and Fabio Martinelli}, editor = {Alessandro Armando and Gavin Lowe}, title = {Modular Plans for Secure Service Composition}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {41--58}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_4}, doi = {10.1007/978-3-642-16074-5\_4}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CostaDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DimkovPH10, author = {Trajce Dimkov and Wolter Pieters and Pieter H. Hartel}, editor = {Alessandro Armando and Gavin Lowe}, title = {Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {112--129}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_9}, doi = {10.1007/978-3-642-16074-5\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DimkovPH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/FalconeF10, author = {Andrea Falcone and Riccardo Focardi}, editor = {Alessandro Armando and Gavin Lowe}, title = {Formal Analysis of Key Integrity in PKCS{\#}11}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {77--94}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_6}, doi = {10.1007/978-3-642-16074-5\_6}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/FalconeF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/FocardiL10, author = {Riccardo Focardi and Flaminia L. Luccio}, editor = {Alessandro Armando and Gavin Lowe}, title = {Secure Upgrade of Hardware Security Modules in Bank Networks}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {95--110}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_7}, doi = {10.1007/978-3-642-16074-5\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/FocardiL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/JaggardMMS10, author = {Aaron D. Jaggard and Catherine Meadows and Michael W. Mislove and Roberto Segala}, editor = {Alessandro Armando and Gavin Lowe}, title = {Reasoning about Probabilistic Security Using Task-PIOAs}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {2--22}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_2}, doi = {10.1007/978-3-642-16074-5\_2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/JaggardMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/NielsonGN10, author = {Flemming Nielson and Han Gao and Hanne Riis Nielson}, editor = {Alessandro Armando and Gavin Lowe}, title = {The CaPiTo Approach to Protocol Validation - (Invited Talk)}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {1}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_1}, doi = {10.1007/978-3-642-16074-5\_1}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip1-7/NielsonGN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/PalamidessiAA10, author = {Catuscia Palamidessi and M{\'{a}}rio S. Alvim and Miguel E. Andr{\'{e}}s}, editor = {Alessandro Armando and Gavin Lowe}, title = {Interactive Information Flow - (Invited Talk)}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {111}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_8}, doi = {10.1007/978-3-642-16074-5\_8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/PalamidessiAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/PiresC10, author = {M{\'{a}}rio Pires and Lu{\'{\i}}s Caires}, editor = {Alessandro Armando and Gavin Lowe}, title = {A Type System for Access Control Views in Object-Oriented Languages}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {59--76}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_5}, doi = {10.1007/978-3-642-16074-5\_5}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/PiresC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10, author = {Ben Smyth and Mark Ryan and Steve Kremer and Mounira Kourjieh}, editor = {Alessandro Armando and Gavin Lowe}, title = {Towards Automatic Analysis of Election Verifiability Properties}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {146--163}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_11}, doi = {10.1007/978-3-642-16074-5\_11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/AdetoyeB09, author = {Adedayo Adetoye and Atta Badii}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {A Policy Model for Secure Information Flow}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {1--17}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_1}, doi = {10.1007/978-3-642-03459-6\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/AdetoyeB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/AldiniB09, author = {Alessandro Aldini and Marco Bernardo}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {18--33}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_2}, doi = {10.1007/978-3-642-03459-6\_2}, timestamp = {Wed, 25 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/AldiniB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/ArsacBCC09, author = {Wihem Arsac and Giampaolo Bella and Xavier Chantry and Luca Compagna}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Validating Security Protocols under the General Attacker}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {34--51}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_3}, doi = {10.1007/978-3-642-03459-6\_3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/ArsacBCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Bartoletti09, author = {Massimo Bartoletti}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Usage Automata}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {52--69}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_4}, doi = {10.1007/978-3-642-03459-6\_4}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Bartoletti09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BodeiBB09, author = {Chiara Bodei and Linda Brodo and Roberto Bruni}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Static Detection of Logic Flaws in Service-Oriented Applications}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {70--87}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_5}, doi = {10.1007/978-3-642-03459-6\_5}, timestamp = {Thu, 26 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BodeiBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/BrobergS09, author = {Niklas Broberg and David Sands}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Improving the Semantics of Imperfect Security}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {88--91}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_6}, doi = {10.1007/978-3-642-03459-6\_6}, timestamp = {Tue, 09 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/BrobergS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/FroschleS09, author = {Sibylle B. Fr{\"{o}}schle and Graham Steel}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Analysing PKCS{\#}11 Key Management APIs with Unbounded Fresh Data}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {92--106}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_7}, doi = {10.1007/978-3-642-03459-6\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/FroschleS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Guttman09, author = {Joshua D. Guttman}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Transformations between Cryptographic Protocols}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {107--123}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_8}, doi = {10.1007/978-3-642-03459-6\_8}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Guttman09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Hernandez-ArdietaFR09, author = {Jorge L. Hernandez{-}Ardieta and Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and Benjam{\'{\i}}n Ramos}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Formal Validation of {OFEPSP+} with {AVISPA}}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {124--137}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_9}, doi = {10.1007/978-3-642-03459-6\_9}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Hernandez-ArdietaFR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/HutterM09, author = {Dieter Hutter and Ra{\'{u}}l Monroy}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {On the Automated Correction of Protocols with Improper Message Encoding}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {138--154}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_10}, doi = {10.1007/978-3-642-03459-6\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/HutterM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/JurjensW09, author = {Jan J{\"{u}}rjens and Tjark Weber}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Finite Models in FOL-Based Crypto-Protocol Verification}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {155--172}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_11}, doi = {10.1007/978-3-642-03459-6\_11}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/JurjensW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/KeighrenAS09, author = {Gavin Keighren and David Aspinall and Graham Steel}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Towards a Type System for Security APIs}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {173--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_12}, doi = {10.1007/978-3-642-03459-6\_12}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/KeighrenAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/MazareW09, author = {Laurent Mazar{\'{e}} and Bogdan Warinschi}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {193--210}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_13}, doi = {10.1007/978-3-642-03459-6\_13}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/MazareW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Ryan09, author = {Peter Y. A. Ryan}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {How Many Election Officials Does It Take to Change an Election?}, booktitle = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, pages = {211--221}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6\_14}, doi = {10.1007/978-3-642-03459-6\_14}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Ryan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2009wits, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Foundations and Applications of Security Analysis, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5511}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03459-6}, doi = {10.1007/978-3-642-03459-6}, isbn = {978-3-642-03458-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2009wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CaleiroVB05a, author = {Carlos Caleiro and Luca Vigan{\`{o}} and David A. Basin}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Deconstructing Alice and Bob}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {3--22}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.007}, doi = {10.1016/J.ENTCS.2005.06.007}, timestamp = {Thu, 15 Dec 2022 13:58:28 +0100}, biburl = {https://dblp.org/rec/journals/entcs/CaleiroVB05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CremersMV05, author = {Cas J. F. Cremers and Sjouke Mauw and Erik P. de Vink}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {A Syntactic Criterion for Injectivity of Authentication Protocols}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {23--38}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.006}, doi = {10.1016/J.ENTCS.2005.06.006}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/CremersMV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DSouzaRS05, author = {Deepak D'Souza and K. R. Raghavendra and Barbara Sprick}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {An Automata Based Approach for Verifying Information Flow Properties}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {39--58}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.005}, doi = {10.1016/J.ENTCS.2005.06.005}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DSouzaRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DeganoV05, author = {Pierpaolo Degano and Luca Vigan{\`{o}}}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Preface}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {1--2}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.008}, doi = {10.1016/J.ENTCS.2005.06.008}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DeganoV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/GotsmanMP05, author = {Alexey Gotsman and Fabio Massacci and Marco Pistore}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Towards an Independent Semantics and Verification Technology for the {HLPSL} Specification Language}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {59--77}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.004}, doi = {10.1016/J.ENTCS.2005.06.004}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/GotsmanMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ImamotoS05, author = {Kenji Imamoto and Kouichi Sakurai}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time {ID} by {SVO} Logic}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {79--94}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.003}, doi = {10.1016/J.ENTCS.2005.06.003}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ImamotoS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/NesiR05, author = {Monica Nesi and Giuseppina Rucci}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {95--114}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.002}, doi = {10.1016/J.ENTCS.2005.06.002}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/NesiR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/NielsenAN05, author = {Christoffer Rosenkilde Nielsen and Esben Heltoft Andersen and Hanne Riis Nielson}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Static Validation of a Voting Protocol}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {115--134}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.001}, doi = {10.1016/J.ENTCS.2005.06.001}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/NielsenAN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/arspa/2004, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, publisher = {Elsevier}, year = {2005}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/125/issue/1}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arspa/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/arspa/2005, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, publisher = {Elsevier}, year = {2005}, url = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/135/issue/1}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arspa/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoC05, author = {Alessandro Armando and Luca Compagna}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {91--108}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.021}, doi = {10.1016/J.ENTCS.2004.05.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoV05, author = {Alessandro Armando and Luca Vigan{\`{o}}}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Preface}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {1}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.09.035}, doi = {10.1016/J.ENTCS.2004.09.035}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BondC05, author = {Mike Bond and Jolyon Clulow}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Extending Security Protocol Analysis: New Challenges}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {13--24}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.09.036}, doi = {10.1016/J.ENTCS.2004.09.036}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/BondC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/CaleiroVB05, author = {Carlos Caleiro and Luca Vigan{\`{o}} and David A. Basin}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Metareasoning about Security Protocols using Distributed Temporal Logic}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {67--89}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.020}, doi = {10.1016/J.ENTCS.2004.05.020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/CaleiroVB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ChevalierKRT05, author = {Yannick Chevalier and Ralf K{\"{u}}sters and Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Deciding the Security of Protocols with Commuting Public Key Encryption}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {55--66}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.019}, doi = {10.1016/J.ENTCS.2004.05.019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/ChevalierKRT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DrielsmaM05, author = {Paul Hankes Drielsma and Sebastian M{\"{o}}dersheim}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {The {ASW} Protocol Revisited: {A} Unified View}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {145--161}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.024}, doi = {10.1016/J.ENTCS.2004.05.024}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DrielsmaM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Foley05, author = {Simon N. Foley}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Believing the Integrity of a System: (Invited Talk)}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {3--12}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.09.037}, doi = {10.1016/J.ENTCS.2004.09.037}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Foley05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/HaoCJ05, author = {Hao Chen and John A. Clark and Jeremy L. Jacob}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Synthesising Efficient and Effective Security Protocols}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {25--41}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.017}, doi = {10.1016/J.ENTCS.2004.05.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/HaoCJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/LynchM05, author = {Christopher Lynch and Catherine Meadows}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {On the Relative Soundness of the Free Algebra Model for Public Key Encryption}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {43--54}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.018}, doi = {10.1016/J.ENTCS.2004.05.018}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/LynchM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Mazare05, author = {Laurent Mazar{\'{e}}}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Satisfiability of Dolev-Yao Constraints}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {109--124}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.022}, doi = {10.1016/J.ENTCS.2004.05.022}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Mazare05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SteelB05, author = {Graham Steel and Alan Bundy}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Attacking Group Multicast Key Management Protocols Using Coral}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {125--144}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.023}, doi = {10.1016/J.ENTCS.2004.05.023}, timestamp = {Tue, 13 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/SteelB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.