Volume 125,
Number 1,
March 2005
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2004)
- Alessandro Armando, Luca Viganò:
Preface.
1-
- Simon N. Foley:
Believing the Integrity of a System: (Invited Talk).
3-12
- Mike Bond, Jolyon Clulow:
Extending Security Protocol Analysis: New Challenges.
13-24
- Hao Chen, John A. Clark, Jeremy L. Jacob:
Synthesising Efficient and Effective Security Protocols.
25-41
- Christopher Lynch, Catherine Meadows:
On the Relative Soundness of the Free Algebra Model for Public Key Encryption.
43-54
- Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani:
Deciding the Security of Protocols with Commuting Public Key Encryption.
55-66
- Carlos Caleiro, Luca Viganò, David A. Basin:
Metareasoning about Security Protocols using Distributed Temporal Logic.
67-89
- Alessandro Armando, Luca Compagna:
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols.
91-108
- Laurent Mazaré:
Satisfiability of Dolev-Yao Constraints.
109-124
- Graham Steel, Alan Bundy:
Attacking Group Multicast Key Management Protocols Using Coral.
125-144
- Paul Hankes Drielsma, Sebastian Mödersheim:
The ASW Protocol Revisited: A Unified View.
145-161
Volume 125,
Number 2,
March 2005
Proceedings of the 5th International Workshop on Strategies in Automated Deduction (Strategies 2004)
Copyright © Mon Mar 15 04:00:56 2010
by Michael Ley (ley@uni-trier.de)