Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/books/collections/CK2011.bht:"
@incollection{DBLP:books/ios/11/Blanchet11, author = {Bruno Blanchet}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Using Horn Clauses for Analyzing Security Protocols}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {86--111}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-86}, doi = {10.3233/978-1-60750-714-7-86}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/Blanchet11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/BressonLMW11, author = {Emmanuel Bresson and Yassine Lakhnech and Laurent Mazar{\'{e}} and Bogdan Warinschi}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Computational Soundness - The Case of Diffie-Hellman Keys}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {277--302}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-277}, doi = {10.3233/978-1-60750-714-7-277}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/BressonLMW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/Comon-LundhDM11, author = {Hubert Comon{-}Lundh and St{\'{e}}phanie Delaune and Jonathan K. Millen}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Constraint solving techniques and enriching the model with equational theories}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {35--61}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-35}, doi = {10.3233/978-1-60750-714-7-35}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/Comon-LundhDM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/CortierK11, author = {V{\'{e}}ronique Cortier and Steve Kremer}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Introduction}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {1--12}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-1}, doi = {10.3233/978-1-60750-714-7-1}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/CortierK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/DattaM0S11, author = {Anupam Datta and John C. Mitchell and Arnab Roy and Stephan Hyeonjun Stiller}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Protocol Composition Logic}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {182--221}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-182}, doi = {10.3233/978-1-60750-714-7-182}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/DattaM0S11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/FocardiM11, author = {Riccardo Focardi and Matteo Maffei}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Types for Security Protocols}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {143--181}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-143}, doi = {10.3233/978-1-60750-714-7-143}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/FocardiM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/Guttman11, author = {Joshua D. Guttman}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Shapes: Surveying Crypto Protocol Runs}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {222--257}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-222}, doi = {10.3233/978-1-60750-714-7-222}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/Guttman11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/Lowe11, author = {Gavin Lowe}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Analysing Security Protocols using {CSP}}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {62--85}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-62}, doi = {10.3233/978-1-60750-714-7-62}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/Lowe11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/RusinowitchT11, author = {Micha{\"{e}}l Rusinowitch and Mathieu Turuani}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Verifying a bounded number of sessions and its complexity}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {13--34}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-13}, doi = {10.3233/978-1-60750-714-7-13}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/RusinowitchT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/RyanS11, author = {Mark Dermot Ryan and Ben Smyth}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Applied pi calculus}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {112--142}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-112}, doi = {10.3233/978-1-60750-714-7-112}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/ios/11/RyanS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/Schneider11, author = {Steve A. Schneider}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Security Analysis using Rank Functions in {CSP}}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {258--276}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-258}, doi = {10.3233/978-1-60750-714-7-258}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/Schneider11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/ios/11/CK2011, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, publisher = {{IOS} Press}, year = {2011}, url = {http://ebooks.iospress.nl/volume/formal-models-and-techniques-for-analyzing-security-protocols}, isbn = {978-1-60750-713-0}, timestamp = {Fri, 15 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/ios/11/CK2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.