AUTOMATED ANALYSIS OF SECURITY CRITICAL SYSTEMS

Filter
Conference contribution

Search results

  • 2007

    A Formal Theory of Key Conjuring

    Cortier, V., Delaune, S. & Steel, G., 2007, Computer Security Foundations Symposium, 2007. CSF '07. 20th IEEE. Institute of Electrical and Electronics Engineers, p. 79-96 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
  • Automatic Analysis of the Security of XOR-Based Key Management Schemes

    Cortier, V., Keighren, G. & Steel, G., 2007, Tools and Algorithms for the Construction and Analysis of Systems: 13th International Conference, TACAS 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2007 Braga, Portugal, March 24 - April 1, 2007. Proceedings. Grumberg, O. & Huth, M. (eds.). Springer, p. 538-552 15 p. (Lecture Notes in Computer Science; vol. 4424).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2006

    On the Decidability of a Class of XOR-based Key-management APIs

    Cortier, V. & Steel, G., 2006, FCS-ARSPA 2006 Proceedings. p. 293-307 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution