Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Model Checking Security Protocols"
@inproceedings{DBLP:conf/cav/BauerCS018, author = {Matthew S. Bauer and Rohit Chadha and A. Prasad Sistla and Mahesh Viswanathan}, editor = {Hana Chockler and Georg Weissenbacher}, title = {Model Checking Indistinguishability of Randomized Security Protocols}, booktitle = {Computer Aided Verification - 30th International Conference, {CAV} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10982}, pages = {117--135}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96142-2\_10}, doi = {10.1007/978-3-319-96142-2\_10}, timestamp = {Fri, 09 Apr 2021 18:35:26 +0200}, biburl = {https://dblp.org/rec/conf/cav/BauerCS018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/Sistla18, author = {A. Prasad Sistla}, editor = {Sumit Ganguly and Paritosh K. Pandya}, title = {Model Checking Randomized Security Protocols (Invited Paper)}, booktitle = {38th {IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2018, December 11-13, 2018, Ahmedabad, India}, series = {LIPIcs}, volume = {122}, pages = {2:1--2:1}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2018.2}, doi = {10.4230/LIPICS.FSTTCS.2018.2}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/fsttcs/Sistla18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/mc/BasinCM18, author = {David A. Basin and Cas Cremers and Catherine Meadows}, editor = {Edmund M. Clarke and Thomas A. Henzinger and Helmut Veith and Roderick Bloem}, title = {Model Checking Security Protocols}, booktitle = {Handbook of Model Checking}, pages = {727--762}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-10575-8\_22}, doi = {10.1007/978-3-319-10575-8\_22}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/mc/BasinCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/PourpounehR16, author = {Mohsen Pourpouneh and Rasoul Ramezanian}, title = {A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {1}, pages = {3--24}, year = {2016}, url = {https://doi.org/10.22042/isecure.2016.8.1.1}, doi = {10.22042/ISECURE.2016.8.1.1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/PourpounehR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/EidgahiR16, author = {Zohreh Saffarian Eidgahi and Vahid Rafe}, title = {Security analysis of network protocols through model checking: a case study on mobile IPv6}, journal = {Secur. Commun. Networks}, volume = {9}, number = {10}, pages = {1072--1084}, year = {2016}, url = {https://doi.org/10.1002/sec.1401}, doi = {10.1002/SEC.1401}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/EidgahiR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cn/Siedlecka-Lamch16, author = {Olga Siedlecka{-}Lamch and Miroslaw Kurkowski and Jacek Piatkowski}, editor = {Piotr Gaj and Andrzej Kwiecien and Piotr Stera}, title = {Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption}, booktitle = {Computer Networks - 23rd International Conference, {CN} 2016, Brun{\'{o}}w, Poland, June 14-17, 2016, Proceedings}, series = {Communications in Computer and Information Science}, volume = {608}, pages = {107--117}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39207-3\_10}, doi = {10.1007/978-3-319-39207-3\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cn/Siedlecka-Lamch16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/topnoc/PuraB15, author = {Mihai{-}Lica Pura and Didier Buchs}, title = {Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies}, journal = {Trans. Petri Nets Other Model. Concurr.}, volume = {10}, pages = {109--130}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48650-4\_6}, doi = {10.1007/978-3-662-48650-4\_6}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/topnoc/PuraB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppam/KurkowskiSSP13, author = {Miroslaw Kurkowski and Olga Siedlecka{-}Lamch and Sabina Szymoniak and Henryk Piech}, editor = {Roman Wyrzykowski and Jack J. Dongarra and Konrad Karczewski and Jerzy Wasniewski}, title = {Parallel Bounded Model Checking of Security Protocols}, booktitle = {Parallel Processing and Applied Mathematics - 10th International Conference, {PPAM} 2013, Warsaw, Poland, September 8-11, 2013, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8384}, pages = {224--234}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-55224-3\_22}, doi = {10.1007/978-3-642-55224-3\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppam/KurkowskiSSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Guedj12, author = {Micha{\"{e}}l Guedj}, title = {{BSP} Algorithms for {LTL} {\&} CTL* Model Checking of Security Protocols. (Algorithmes {BSP} pour la v{\'{e}}rification de mod{\`{e}}les {LTL} et CTL* pour les protocoles de s{\'{e}}curit{\'{e}})}, school = {University of Paris-Est, France}, year = {2012}, url = {https://tel.archives-ouvertes.fr/tel-02614938}, timestamp = {Mon, 28 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Guedj12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tap/ArmandoPCMB12, author = {Alessandro Armando and Giancarlo Pellegrino and Roberto Carbone and Alessio Merlo and Davide Balzarotti}, editor = {Achim D. Brucker and Jacques Julliand}, title = {From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap}, booktitle = {Tests and Proofs - 6th International Conference, TAP@TOOLS 2012, Prague, Czech Republic, May 31 - June 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7305}, pages = {3--18}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30473-6\_3}, doi = {10.1007/978-3-642-30473-6\_3}, timestamp = {Tue, 23 Jun 2020 17:37:39 +0200}, biburl = {https://dblp.org/rec/conf/tap/ArmandoPCMB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/KurkowskiP12, author = {Miroslaw Kurkowski and Wojciech Penczek}, editor = {Jiacun Wang}, title = {Applying Timed Automata to Model Checking of Security Protocols}, booktitle = {Handbook of Finite State Based Models and Applications}, pages = {223--254}, publisher = {Chapman and Hall/CRC}, year = {2012}, url = {https://doi.org/10.1201/b13055-12}, doi = {10.1201/B13055-12}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/KurkowskiP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Nizamani11, author = {Qurat ul Ain Nizamani}, title = {Directed symbolic model checking of security protocols}, school = {University of Leicester, {UK}}, year = {2011}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.551734}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Nizamani11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aicom/Carbone11, author = {Roberto Carbone}, title = {{LTL} model-checking for security protocols}, journal = {{AI} Commun.}, volume = {24}, number = {3}, pages = {281--283}, year = {2011}, url = {https://doi.org/10.3233/AIC-2010-0489}, doi = {10.3233/AIC-2010-0489}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aicom/Carbone11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BasagiannisKP11, author = {Stylianos Basagiannis and Panagiotis Katsaros and Andrew Pombortsis}, title = {Synthesis of attack actions using model checking for the verification of security protocols}, journal = {Secur. Commun. Networks}, volume = {4}, number = {2}, pages = {147--161}, year = {2011}, url = {https://doi.org/10.1002/sec.119}, doi = {10.1002/SEC.119}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BasagiannisKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BasagiannisKP10, author = {Stylianos Basagiannis and Panagiotis Katsaros and Andrew Pombortsis}, title = {An intruder model with message inspection for model checking security protocols}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {16--34}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.08.003}, doi = {10.1016/J.COSE.2009.08.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BasagiannisKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/KurkowskiP09, author = {Miroslaw Kurkowski and Wojciech Penczek}, title = {Timed Automata Based Model Checking of Timed Security Protocols}, journal = {Fundam. Informaticae}, volume = {93}, number = {1-3}, pages = {245--259}, year = {2009}, url = {https://doi.org/10.3233/FI-2009-0100}, doi = {10.3233/FI-2009-0100}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/KurkowskiP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jancl/ArmandoCC09, author = {Alessandro Armando and Roberto Carbone and Luca Compagna}, title = {{LTL} model checking for security protocols}, journal = {J. Appl. Non Class. Logics}, volume = {19}, number = {4}, pages = {403--429}, year = {2009}, url = {https://doi.org/10.3166/jancl.19.403-429}, doi = {10.3166/JANCL.19.403-429}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jancl/ArmandoCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/TobarraCCDC09, author = {Llanos Tobarra and Diego Cazorla and Fernando Cuartero and Gregorio D{\'{\i}}az and Mar{\'{\i}}a{-}Emilia Cambronero}, title = {Model checking wireless sensor network security protocols: TinySec + {LEAP} + TinyPK}, journal = {Telecommun. Syst.}, volume = {40}, number = {3-4}, pages = {91--99}, year = {2009}, url = {https://doi.org/10.1007/s11235-008-9131-z}, doi = {10.1007/S11235-008-9131-Z}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/TobarraCCDC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/LomuscioP08, author = {Alessio Lomuscio and Wojciech Penczek}, title = {{LDYIS:} a Framework for Model Checking Security Protocols}, journal = {Fundam. Informaticae}, volume = {85}, number = {1-4}, pages = {359--375}, year = {2008}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi85-1-4-25}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/LomuscioP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ArmandoC08, author = {Alessandro Armando and Luca Compagna}, title = {SAT-based model-checking for security protocols analysis}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {3--32}, year = {2008}, url = {https://doi.org/10.1007/s10207-007-0041-y}, doi = {10.1007/S10207-007-0041-Y}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ArmandoC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/JakubowskaP07, author = {Gizela Jakubowska and Wojciech Penczek}, title = {Modelling and Checking Timed Authentication of Security Protocols}, journal = {Fundam. Informaticae}, volume = {79}, number = {3-4}, pages = {363--378}, year = {2007}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi79-3-4-09}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/JakubowskaP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/ArmandoCC07, author = {Alessandro Armando and Roberto Carbone and Luca Compagna}, title = {{LTL} Model Checking for Security Protocols}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {385--396}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.24}, doi = {10.1109/CSF.2007.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/ArmandoCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icqnm/BaltazarCMS07, author = {Pedro Baltazar and Rohit Chadha and Paulo Mateus and Am{\'{\i}}lcar Sernadas}, title = {Towards Model-Checking Quantum Security Protocols}, booktitle = {First International Conference on Quantum, Nano, and Micro Technologies, {ICQNM} 2007, January 2-6, 2007, Guadeloupe, French Caribbean}, pages = {14}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICQNM.2007.21}, doi = {10.1109/ICQNM.2007.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icqnm/BaltazarCMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip6-8/TobarraCCDC07, author = {Llanos Tobarra and Diego Cazorla and Fernando Cuartero and Gregorio D{\'{\i}}az and Mar{\'{\i}}a{-}Emilia Cambronero}, editor = {Luis Orozco{-}Barbosa and Teresa Olivares and Rafael Casado and Aurelio Berm{\'{u}}dez}, title = {Model Checking Wireless Sensor Network Security Protocols: TinySec + {LEAP}}, booktitle = {Wireless Sensor and Actor Networks - {IFIP} {WG} 6.8 First International Conference on Wireless Sensor and Actor Networks, WSAN'07, Albacete, Spain, September 24-26, 2007}, series = {{IFIP}}, volume = {248}, pages = {95--106}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-74899-3\_9}, doi = {10.1007/978-0-387-74899-3\_9}, timestamp = {Mon, 03 Jan 2022 22:35:08 +0100}, biburl = {https://dblp.org/rec/conf/ifip6-8/TobarraCCDC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CorinEHM04, author = {Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Angelika Mader}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Timed model checking of security protocols}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {23--32}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029137}, doi = {10.1145/1029133.1029137}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CorinEHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ArmandoC05, author = {Alessandro Armando and Luca Compagna}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {91--108}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.021}, doi = {10.1016/J.ENTCS.2004.05.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/ArmandoC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/ArmandoCG03, author = {Alessandro Armando and Luca Compagna and Pierre Ganty}, editor = {Keijiro Araki and Stefania Gnesi and Dino Mandrioli}, title = {SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis}, booktitle = {{FME} 2003: Formal Methods, International Symposium of Formal Methods Europe, Pisa, Italy, September 8-14, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2805}, pages = {875--893}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45236-2\_47}, doi = {10.1007/978-3-540-45236-2\_47}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/ArmandoCG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimAB03, author = {Kyoil Kim and Jacob A. Abraham and Jayanta Bhadra}, editor = {Kijoon Chae and Moti Yung}, title = {Model Checking of Security Protocols with Pre-configuration}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {1--15}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_1}, doi = {10.1007/978-3-540-24591-9\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimAB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Broadfoot01, author = {Philippa J. Broadfoot}, title = {Data independence in the model checking of security protocols}, school = {University of Oxford, {UK}}, year = {2001}, url = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.393432}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Broadfoot01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/BenerecettiGPS00, author = {Massimo Benerecetti and Fausto Giunchiglia and Maurizio Panti and Luca Spalazzi}, editor = {Tommaso Bolognesi and Diego Latella}, title = {A Logic of Belief and a Model Checking Algorithm for Security Protocols}, booktitle = {Formal Techniques for Distributed System Development, {FORTE/PSTV} 2000, {IFIP} {TC6} {WG6.1} Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols {(FORTE} {XIII)} and Protocol Specification, Testing and Verification {(PSTV} XX), October 10-13, 2000, Pisa, Italy}, series = {{IFIP} Conference Proceedings}, volume = {183}, pages = {393--408}, publisher = {Kluwer}, year = {2000}, timestamp = {Tue, 19 Feb 2002 10:53:34 +0100}, biburl = {https://dblp.org/rec/conf/forte/BenerecettiGPS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/BenerecettiG00, author = {Massimo Benerecetti and Fausto Giunchiglia}, editor = {Susanne Graf and Michael I. Schwartzbach}, title = {Model Checking Security Protocols Using a Logic of Belief}, booktitle = {Tools and Algorithms for Construction and Analysis of Systems, 6th International Conference, {TACAS} 2000, Held as Part of the European Joint Conferences on the Theory and Practice of Software, {ETAPS} 2000, Berlin, Germany, March 25 - April 2, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1785}, pages = {519--534}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-46419-0\_35}, doi = {10.1007/3-540-46419-0\_35}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/BenerecettiG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Lowe99, author = {Gavin Lowe}, title = {Towards a Completeness Result for Model Checking of Security Protocols}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {89--146}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-72-302}, doi = {10.3233/JCS-1999-72-302}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Lowe99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lowe98, author = {Gavin Lowe}, title = {Towards a Completeness Result for Model Checking of Security Protocols}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {96--105}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683159}, doi = {10.1109/CSFW.1998.683159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Lowe98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.