1![Analysis of Cryptographic Protocols using Logics of Belief: an Overview David Monniaux ´ Ecole Normale Sup´erieure Analysis of Cryptographic Protocols using Logics of Belief: an Overview David Monniaux ´ Ecole Normale Sup´erieure](https://www.pdfsearch.io/img/8415655587e43093354b528b40d629f8.jpg) | Add to Reading ListSource URL: www-verimag.imag.frLanguage: English - Date: 2007-10-18 09:44:19
|
---|
2![Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole Abstracting Cryptographic Protocols with Tree Automata ? David Monniaux http://www.di.ens.fr/%7Fmonniaux, ´ Laboratoire d’Informatique, Ecole](https://www.pdfsearch.io/img/3beb8f2d687a6f4e6f86de6659680ab4.jpg) | Add to Reading ListSource URL: www-verimag.imag.frLanguage: English - Date: 2007-10-18 09:44:59
|
---|
3![Pattern-Matching Spi-Calculus∗ Christian Haack Security of Systems Group Faculty of Science, Radboud University Postbus 9010, 6500 GL Nijmegen, The Netherlands Pattern-Matching Spi-Calculus∗ Christian Haack Security of Systems Group Faculty of Science, Radboud University Postbus 9010, 6500 GL Nijmegen, The Netherlands](https://www.pdfsearch.io/img/a14e4aa04d9727bb45ad1bd1c915a32d.jpg) | Add to Reading ListSource URL: ect.bell-labs.comLanguage: English - Date: 2010-12-15 21:41:03
|
---|
4![A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and A. Datta et al. / Protocol Composition Logic 1 Protocol Composition Logic Anupam DATTA a , John C. MITCHELL b , Arnab ROY b and](https://www.pdfsearch.io/img/213887cfa55decbc80b5a52663854956.jpg) | Add to Reading ListSource URL: seclab.stanford.eduLanguage: English - Date: 2010-07-17 01:14:08
|
---|
5![PATTERN-MATCHING SPI-CALCULUS∗ Christian Haack DePaul University Alan Jeffrey Bell Labs, Lucent Technologies PATTERN-MATCHING SPI-CALCULUS∗ Christian Haack DePaul University Alan Jeffrey Bell Labs, Lucent Technologies](https://www.pdfsearch.io/img/1c79db7f984e20e148eb05c2a80d288b.jpg) | Add to Reading ListSource URL: ect.bell-labs.comLanguage: English - Date: 2010-12-15 21:39:38
|
---|
6![Typing One-to-One and One-to-Many Correspondences in Security Protocols Andrew D. Gordon1 and Alan Jeffrey2 1 2 Typing One-to-One and One-to-Many Correspondences in Security Protocols Andrew D. Gordon1 and Alan Jeffrey2 1 2](https://www.pdfsearch.io/img/e54ca85a583935356cc470b21d2016bc.jpg) | Add to Reading ListSource URL: ect.bell-labs.comLanguage: English - Date: 2010-12-15 21:35:36
|
---|