1 | -- | 3 | Alessandro Armando, David A. Basin, Jorge Cuéllar, Michaël Rusinowitch, Luca Viganò. Automated Reasoning for Security Protocol Analysis |
5 | -- | 37 | Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson. Verifying the SET Purchase Protocols |
39 | -- | 83 | Rohit Chadha, Steve Kremer, Andre Scedrov. Formal Analysis of Multiparty Contract Signing |
85 | -- | 124 | Stéphanie Delaune, Florent Jacquemard. Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks |
125 | -- | 147 | Hans Hüttel, Jirí Srba. Decidability Issues for Extended Ping-Pong Protocols |
149 | -- | 176 | Graham Steel, Alan Bundy. Attacking Group Protocols by Refuting Incorrect Inductive Conjectures |