Search dblp for Publications

export results for "toc:db/books/collections/CK2011.bht:"

 download as .bib file

@incollection{DBLP:books/ios/11/Blanchet11,
  author       = {Bruno Blanchet},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Using Horn Clauses for Analyzing Security Protocols},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {86--111},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-86},
  doi          = {10.3233/978-1-60750-714-7-86},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/Blanchet11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/BressonLMW11,
  author       = {Emmanuel Bresson and
                  Yassine Lakhnech and
                  Laurent Mazar{\'{e}} and
                  Bogdan Warinschi},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Computational Soundness - The Case of Diffie-Hellman Keys},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {277--302},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-277},
  doi          = {10.3233/978-1-60750-714-7-277},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/BressonLMW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/Comon-LundhDM11,
  author       = {Hubert Comon{-}Lundh and
                  St{\'{e}}phanie Delaune and
                  Jonathan K. Millen},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Constraint solving techniques and enriching the model with equational
                  theories},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {35--61},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-35},
  doi          = {10.3233/978-1-60750-714-7-35},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/Comon-LundhDM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/CortierK11,
  author       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Introduction},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {1--12},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-1},
  doi          = {10.3233/978-1-60750-714-7-1},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/CortierK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/DattaM0S11,
  author       = {Anupam Datta and
                  John C. Mitchell and
                  Arnab Roy and
                  Stephan Hyeonjun Stiller},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Protocol Composition Logic},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {182--221},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-182},
  doi          = {10.3233/978-1-60750-714-7-182},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/DattaM0S11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/FocardiM11,
  author       = {Riccardo Focardi and
                  Matteo Maffei},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Types for Security Protocols},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {143--181},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-143},
  doi          = {10.3233/978-1-60750-714-7-143},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/FocardiM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/Guttman11,
  author       = {Joshua D. Guttman},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Shapes: Surveying Crypto Protocol Runs},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {222--257},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-222},
  doi          = {10.3233/978-1-60750-714-7-222},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/Guttman11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/Lowe11,
  author       = {Gavin Lowe},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Analysing Security Protocols using {CSP}},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {62--85},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-62},
  doi          = {10.3233/978-1-60750-714-7-62},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/Lowe11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/RusinowitchT11,
  author       = {Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Verifying a bounded number of sessions and its complexity},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {13--34},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-13},
  doi          = {10.3233/978-1-60750-714-7-13},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/RusinowitchT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/RyanS11,
  author       = {Mark Dermot Ryan and
                  Ben Smyth},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Applied pi calculus},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {112--142},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-112},
  doi          = {10.3233/978-1-60750-714-7-112},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/ios/11/RyanS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/Schneider11,
  author       = {Steve A. Schneider},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Security Analysis using Rank Functions in {CSP}},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {258--276},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-258},
  doi          = {10.3233/978-1-60750-714-7-258},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/Schneider11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/ios/11/CK2011,
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {http://ebooks.iospress.nl/volume/formal-models-and-techniques-for-analyzing-security-protocols},
  isbn         = {978-1-60750-713-0},
  timestamp    = {Fri, 15 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/CK2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics