Search results
-
2007
A Formal Theory of Key Conjuring
Cortier, V., Delaune, S. & Steel, G., 2007, Computer Security Foundations Symposium, 2007. CSF '07. 20th IEEE. Institute of Electrical and Electronics Engineers, p. 79-96 18 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
File -
Automatic Analysis of the Security of XOR-Based Key Management Schemes
Cortier, V., Keighren, G. & Steel, G., 2007, Tools and Algorithms for the Construction and Analysis of Systems: 13th International Conference, TACAS 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2007 Braga, Portugal, March 24 - April 1, 2007. Proceedings. Grumberg, O. & Huth, M. (eds.). Springer, p. 538-552 15 p. (Lecture Notes in Computer Science; vol. 4424).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
2006
On the Decidability of a Class of XOR-based Key-management APIs
Cortier, V. & Steel, G., 2006, FCS-ARSPA 2006 Proceedings. p. 293-307 15 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution