Search dblp for Publications

export results for "Model Checking Security Protocols"

 download as .bib file

@inproceedings{DBLP:conf/cav/BauerCS018,
  author       = {Matthew S. Bauer and
                  Rohit Chadha and
                  A. Prasad Sistla and
                  Mahesh Viswanathan},
  editor       = {Hana Chockler and
                  Georg Weissenbacher},
  title        = {Model Checking Indistinguishability of Randomized Security Protocols},
  booktitle    = {Computer Aided Verification - 30th International Conference, {CAV}
                  2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford,
                  UK, July 14-17, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10982},
  pages        = {117--135},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96142-2\_10},
  doi          = {10.1007/978-3-319-96142-2\_10},
  timestamp    = {Fri, 09 Apr 2021 18:35:26 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BauerCS018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/Sistla18,
  author       = {A. Prasad Sistla},
  editor       = {Sumit Ganguly and
                  Paritosh K. Pandya},
  title        = {Model Checking Randomized Security Protocols (Invited Paper)},
  booktitle    = {38th {IARCS} Annual Conference on Foundations of Software Technology
                  and Theoretical Computer Science, {FSTTCS} 2018, December 11-13, 2018,
                  Ahmedabad, India},
  series       = {LIPIcs},
  volume       = {122},
  pages        = {2:1--2:1},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2018},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2018.2},
  doi          = {10.4230/LIPICS.FSTTCS.2018.2},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/fsttcs/Sistla18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/mc/BasinCM18,
  author       = {David A. Basin and
                  Cas Cremers and
                  Catherine Meadows},
  editor       = {Edmund M. Clarke and
                  Thomas A. Henzinger and
                  Helmut Veith and
                  Roderick Bloem},
  title        = {Model Checking Security Protocols},
  booktitle    = {Handbook of Model Checking},
  pages        = {727--762},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-10575-8\_22},
  doi          = {10.1007/978-3-319-10575-8\_22},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/mc/BasinCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PourpounehR16,
  author       = {Mohsen Pourpouneh and
                  Rasoul Ramezanian},
  title        = {A short introduction to two approaches in formal verification of security
                  protocols: model checking and theorem proving},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {3--24},
  year         = {2016},
  url          = {https://doi.org/10.22042/isecure.2016.8.1.1},
  doi          = {10.22042/ISECURE.2016.8.1.1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/PourpounehR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/EidgahiR16,
  author       = {Zohreh Saffarian Eidgahi and
                  Vahid Rafe},
  title        = {Security analysis of network protocols through model checking: a case
                  study on mobile IPv6},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {10},
  pages        = {1072--1084},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1401},
  doi          = {10.1002/SEC.1401},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/EidgahiR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cn/Siedlecka-Lamch16,
  author       = {Olga Siedlecka{-}Lamch and
                  Miroslaw Kurkowski and
                  Jacek Piatkowski},
  editor       = {Piotr Gaj and
                  Andrzej Kwiecien and
                  Piotr Stera},
  title        = {Probabilistic Model Checking of Security Protocols without Perfect
                  Cryptography Assumption},
  booktitle    = {Computer Networks - 23rd International Conference, {CN} 2016, Brun{\'{o}}w,
                  Poland, June 14-17, 2016, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {608},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39207-3\_10},
  doi          = {10.1007/978-3-319-39207-3\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cn/Siedlecka-Lamch16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/topnoc/PuraB15,
  author       = {Mihai{-}Lica Pura and
                  Didier Buchs},
  title        = {Symbolic Model Checking of Security Protocols for Ad hoc Networks
                  on any Topologies},
  journal      = {Trans. Petri Nets Other Model. Concurr.},
  volume       = {10},
  pages        = {109--130},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48650-4\_6},
  doi          = {10.1007/978-3-662-48650-4\_6},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/topnoc/PuraB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppam/KurkowskiSSP13,
  author       = {Miroslaw Kurkowski and
                  Olga Siedlecka{-}Lamch and
                  Sabina Szymoniak and
                  Henryk Piech},
  editor       = {Roman Wyrzykowski and
                  Jack J. Dongarra and
                  Konrad Karczewski and
                  Jerzy Wasniewski},
  title        = {Parallel Bounded Model Checking of Security Protocols},
  booktitle    = {Parallel Processing and Applied Mathematics - 10th International Conference,
                  {PPAM} 2013, Warsaw, Poland, September 8-11, 2013, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8384},
  pages        = {224--234},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-55224-3\_22},
  doi          = {10.1007/978-3-642-55224-3\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ppam/KurkowskiSSP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Guedj12,
  author       = {Micha{\"{e}}l Guedj},
  title        = {{BSP} Algorithms for {LTL} {\&} CTL* Model Checking of Security
                  Protocols. (Algorithmes {BSP} pour la v{\'{e}}rification de mod{\`{e}}les
                  {LTL} et CTL* pour les protocoles de s{\'{e}}curit{\'{e}})},
  school       = {University of Paris-Est, France},
  year         = {2012},
  url          = {https://tel.archives-ouvertes.fr/tel-02614938},
  timestamp    = {Mon, 28 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Guedj12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tap/ArmandoPCMB12,
  author       = {Alessandro Armando and
                  Giancarlo Pellegrino and
                  Roberto Carbone and
                  Alessio Merlo and
                  Davide Balzarotti},
  editor       = {Achim D. Brucker and
                  Jacques Julliand},
  title        = {From Model-Checking to Automated Testing of Security Protocols: Bridging
                  the Gap},
  booktitle    = {Tests and Proofs - 6th International Conference, TAP@TOOLS 2012, Prague,
                  Czech Republic, May 31 - June 1, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7305},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30473-6\_3},
  doi          = {10.1007/978-3-642-30473-6\_3},
  timestamp    = {Tue, 23 Jun 2020 17:37:39 +0200},
  biburl       = {https://dblp.org/rec/conf/tap/ArmandoPCMB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/KurkowskiP12,
  author       = {Miroslaw Kurkowski and
                  Wojciech Penczek},
  editor       = {Jiacun Wang},
  title        = {Applying Timed Automata to Model Checking of Security Protocols},
  booktitle    = {Handbook of Finite State Based Models and Applications},
  pages        = {223--254},
  publisher    = {Chapman and Hall/CRC},
  year         = {2012},
  url          = {https://doi.org/10.1201/b13055-12},
  doi          = {10.1201/B13055-12},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/KurkowskiP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Nizamani11,
  author       = {Qurat ul Ain Nizamani},
  title        = {Directed symbolic model checking of security protocols},
  school       = {University of Leicester, {UK}},
  year         = {2011},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.551734},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Nizamani11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aicom/Carbone11,
  author       = {Roberto Carbone},
  title        = {{LTL} model-checking for security protocols},
  journal      = {{AI} Commun.},
  volume       = {24},
  number       = {3},
  pages        = {281--283},
  year         = {2011},
  url          = {https://doi.org/10.3233/AIC-2010-0489},
  doi          = {10.3233/AIC-2010-0489},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aicom/Carbone11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BasagiannisKP11,
  author       = {Stylianos Basagiannis and
                  Panagiotis Katsaros and
                  Andrew Pombortsis},
  title        = {Synthesis of attack actions using model checking for the verification
                  of security protocols},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {2},
  pages        = {147--161},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.119},
  doi          = {10.1002/SEC.119},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BasagiannisKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BasagiannisKP10,
  author       = {Stylianos Basagiannis and
                  Panagiotis Katsaros and
                  Andrew Pombortsis},
  title        = {An intruder model with message inspection for model checking security
                  protocols},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {16--34},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.08.003},
  doi          = {10.1016/J.COSE.2009.08.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BasagiannisKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/KurkowskiP09,
  author       = {Miroslaw Kurkowski and
                  Wojciech Penczek},
  title        = {Timed Automata Based Model Checking of Timed Security Protocols},
  journal      = {Fundam. Informaticae},
  volume       = {93},
  number       = {1-3},
  pages        = {245--259},
  year         = {2009},
  url          = {https://doi.org/10.3233/FI-2009-0100},
  doi          = {10.3233/FI-2009-0100},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/KurkowskiP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jancl/ArmandoCC09,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna},
  title        = {{LTL} model checking for security protocols},
  journal      = {J. Appl. Non Class. Logics},
  volume       = {19},
  number       = {4},
  pages        = {403--429},
  year         = {2009},
  url          = {https://doi.org/10.3166/jancl.19.403-429},
  doi          = {10.3166/JANCL.19.403-429},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jancl/ArmandoCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/TobarraCCDC09,
  author       = {Llanos Tobarra and
                  Diego Cazorla and
                  Fernando Cuartero and
                  Gregorio D{\'{\i}}az and
                  Mar{\'{\i}}a{-}Emilia Cambronero},
  title        = {Model checking wireless sensor network security protocols: TinySec
                  + {LEAP} + TinyPK},
  journal      = {Telecommun. Syst.},
  volume       = {40},
  number       = {3-4},
  pages        = {91--99},
  year         = {2009},
  url          = {https://doi.org/10.1007/s11235-008-9131-z},
  doi          = {10.1007/S11235-008-9131-Z},
  timestamp    = {Wed, 18 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/TobarraCCDC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/LomuscioP08,
  author       = {Alessio Lomuscio and
                  Wojciech Penczek},
  title        = {{LDYIS:} a Framework for Model Checking Security Protocols},
  journal      = {Fundam. Informaticae},
  volume       = {85},
  number       = {1-4},
  pages        = {359--375},
  year         = {2008},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi85-1-4-25},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/LomuscioP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArmandoC08,
  author       = {Alessandro Armando and
                  Luca Compagna},
  title        = {SAT-based model-checking for security protocols analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {1},
  pages        = {3--32},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10207-007-0041-y},
  doi          = {10.1007/S10207-007-0041-Y},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArmandoC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/JakubowskaP07,
  author       = {Gizela Jakubowska and
                  Wojciech Penczek},
  title        = {Modelling and Checking Timed Authentication of Security Protocols},
  journal      = {Fundam. Informaticae},
  volume       = {79},
  number       = {3-4},
  pages        = {363--378},
  year         = {2007},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi79-3-4-09},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/JakubowskaP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/ArmandoCC07,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna},
  title        = {{LTL} Model Checking for Security Protocols},
  booktitle    = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8
                  July 2007, Venice, Italy},
  pages        = {385--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/CSF.2007.24},
  doi          = {10.1109/CSF.2007.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/ArmandoCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icqnm/BaltazarCMS07,
  author       = {Pedro Baltazar and
                  Rohit Chadha and
                  Paulo Mateus and
                  Am{\'{\i}}lcar Sernadas},
  title        = {Towards Model-Checking Quantum Security Protocols},
  booktitle    = {First International Conference on Quantum, Nano, and Micro Technologies,
                  {ICQNM} 2007, January 2-6, 2007, Guadeloupe, French Caribbean},
  pages        = {14},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICQNM.2007.21},
  doi          = {10.1109/ICQNM.2007.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icqnm/BaltazarCMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip6-8/TobarraCCDC07,
  author       = {Llanos Tobarra and
                  Diego Cazorla and
                  Fernando Cuartero and
                  Gregorio D{\'{\i}}az and
                  Mar{\'{\i}}a{-}Emilia Cambronero},
  editor       = {Luis Orozco{-}Barbosa and
                  Teresa Olivares and
                  Rafael Casado and
                  Aurelio Berm{\'{u}}dez},
  title        = {Model Checking Wireless Sensor Network Security Protocols: TinySec
                  + {LEAP}},
  booktitle    = {Wireless Sensor and Actor Networks - {IFIP} {WG} 6.8 First International
                  Conference on Wireless Sensor and Actor Networks, WSAN'07, Albacete,
                  Spain, September 24-26, 2007},
  series       = {{IFIP}},
  volume       = {248},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-74899-3\_9},
  doi          = {10.1007/978-0-387-74899-3\_9},
  timestamp    = {Mon, 03 Jan 2022 22:35:08 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip6-8/TobarraCCDC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CorinEHM04,
  author       = {Ricardo Corin and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Angelika Mader},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Timed model checking of security protocols},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029137},
  doi          = {10.1145/1029133.1029137},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CorinEHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoC05,
  author       = {Alessandro Armando and
                  Luca Compagna},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {An Optimized Intruder Model for SAT-based Model-Checking of Security
                  Protocols},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {91--108},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.021},
  doi          = {10.1016/J.ENTCS.2004.05.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/ArmandoCG03,
  author       = {Alessandro Armando and
                  Luca Compagna and
                  Pierre Ganty},
  editor       = {Keijiro Araki and
                  Stefania Gnesi and
                  Dino Mandrioli},
  title        = {SAT-Based Model-Checking of Security Protocols Using Planning Graph
                  Analysis},
  booktitle    = {{FME} 2003: Formal Methods, International Symposium of Formal Methods
                  Europe, Pisa, Italy, September 8-14, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2805},
  pages        = {875--893},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45236-2\_47},
  doi          = {10.1007/978-3-540-45236-2\_47},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/ArmandoCG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimAB03,
  author       = {Kyoil Kim and
                  Jacob A. Abraham and
                  Jayanta Bhadra},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Model Checking of Security Protocols with Pre-configuration},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_1},
  doi          = {10.1007/978-3-540-24591-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimAB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Broadfoot01,
  author       = {Philippa J. Broadfoot},
  title        = {Data independence in the model checking of security protocols},
  school       = {University of Oxford, {UK}},
  year         = {2001},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.393432},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Broadfoot01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/BenerecettiGPS00,
  author       = {Massimo Benerecetti and
                  Fausto Giunchiglia and
                  Maurizio Panti and
                  Luca Spalazzi},
  editor       = {Tommaso Bolognesi and
                  Diego Latella},
  title        = {A Logic of Belief and a Model Checking Algorithm for Security Protocols},
  booktitle    = {Formal Techniques for Distributed System Development, {FORTE/PSTV}
                  2000, {IFIP} {TC6} {WG6.1} Joint International Conference on Formal
                  Description Techniques for Distributed Systems and Communication Protocols
                  {(FORTE} {XIII)} and Protocol Specification, Testing and Verification
                  {(PSTV} XX), October 10-13, 2000, Pisa, Italy},
  series       = {{IFIP} Conference Proceedings},
  volume       = {183},
  pages        = {393--408},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Tue, 19 Feb 2002 10:53:34 +0100},
  biburl       = {https://dblp.org/rec/conf/forte/BenerecettiGPS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/BenerecettiG00,
  author       = {Massimo Benerecetti and
                  Fausto Giunchiglia},
  editor       = {Susanne Graf and
                  Michael I. Schwartzbach},
  title        = {Model Checking Security Protocols Using a Logic of Belief},
  booktitle    = {Tools and Algorithms for Construction and Analysis of Systems, 6th
                  International Conference, {TACAS} 2000, Held as Part of the European
                  Joint Conferences on the Theory and Practice of Software, {ETAPS}
                  2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1785},
  pages        = {519--534},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-46419-0\_35},
  doi          = {10.1007/3-540-46419-0\_35},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/BenerecettiG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Lowe99,
  author       = {Gavin Lowe},
  title        = {Towards a Completeness Result for Model Checking of Security Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {89--146},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-72-302},
  doi          = {10.3233/JCS-1999-72-302},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Lowe99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lowe98,
  author       = {Gavin Lowe},
  title        = {Towards a Completeness Result for Model Checking of Security Protocols},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {96--105},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683159},
  doi          = {10.1109/CSFW.1998.683159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Lowe98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics