Journal: Electronic Notes in Theoretical Computer Science

Volume 135, Issue 1

1 -- 2Pierpaolo Degano, Luca ViganĂ². Preface
3 -- 22Carlos Caleiro, Luca ViganĂ², David A. Basin. Deconstructing Alice and Bob
23 -- 38Cas J. F. Cremers, Sjouke Mauw, Erik P. de Vink. A Syntactic Criterion for Injectivity of Authentication Protocols
39 -- 58Deepak D Souza, K. R. Raghavendra, Barbara Sprick. An Automata Based Approach for Verifying Information Flow Properties
59 -- 77Alexey Gotsman, Fabio Massacci, Marco Pistore. Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language
79 -- 94Kenji Imamoto, Kouichi Sakurai. Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic
95 -- 114Monica Nesi, Giuseppina Rucci. Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting
115 -- 134Christoffer Rosenkilde Nielsen, Esben Heltoft Andersen, Hanne Riis Nielson. Static Validation of a Voting Protocol