Search dblp for Publications

export results for "stream:conf/arspa:"

 download as .bib file

@proceedings{DBLP:conf/ifip1-7/2010wits,
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-16074-5},
  doi          = {10.1007/978-3-642-16074-5},
  isbn         = {978-3-642-16073-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BugliesiCM10,
  author       = {Michele Bugliesi and
                  Stefano Calzavara and
                  Damiano Macedonio},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Secrecy and Authenticity Types for Secure Distributed Messaging},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_3},
  doi          = {10.1007/978-3-642-16074-5\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BugliesiCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BugliesiM10,
  author       = {Michele Bugliesi and
                  Paolo Modesti},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {AnBx - Security Protocols Design and Verification},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {164--184},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_12},
  doi          = {10.1007/978-3-642-16074-5\_12},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BugliesiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/CentenaroF10,
  author       = {Matteo Centenaro and
                  Riccardo Focardi},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Match It or Die: Proving Integrity by Equality},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {130--145},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_10},
  doi          = {10.1007/978-3-642-16074-5\_10},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/CentenaroF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/CostaDM10,
  author       = {Gabriele Costa and
                  Pierpaolo Degano and
                  Fabio Martinelli},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Modular Plans for Secure Service Composition},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {41--58},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_4},
  doi          = {10.1007/978-3-642-16074-5\_4},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/CostaDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DimkovPH10,
  author       = {Trajce Dimkov and
                  Wolter Pieters and
                  Pieter H. Hartel},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Portunes: Representing Attack Scenarios Spanning through the Physical,
                  Digital and Social Domain},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {112--129},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_9},
  doi          = {10.1007/978-3-642-16074-5\_9},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DimkovPH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/FalconeF10,
  author       = {Andrea Falcone and
                  Riccardo Focardi},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Formal Analysis of Key Integrity in PKCS{\#}11},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {77--94},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_6},
  doi          = {10.1007/978-3-642-16074-5\_6},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/FalconeF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/FocardiL10,
  author       = {Riccardo Focardi and
                  Flaminia L. Luccio},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Secure Upgrade of Hardware Security Modules in Bank Networks},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {95--110},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_7},
  doi          = {10.1007/978-3-642-16074-5\_7},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/FocardiL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/JaggardMMS10,
  author       = {Aaron D. Jaggard and
                  Catherine Meadows and
                  Michael W. Mislove and
                  Roberto Segala},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Reasoning about Probabilistic Security Using Task-PIOAs},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {2--22},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_2},
  doi          = {10.1007/978-3-642-16074-5\_2},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/JaggardMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/NielsonGN10,
  author       = {Flemming Nielson and
                  Han Gao and
                  Hanne Riis Nielson},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {The CaPiTo Approach to Protocol Validation - (Invited Talk)},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {1},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_1},
  doi          = {10.1007/978-3-642-16074-5\_1},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/NielsonGN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/PalamidessiAA10,
  author       = {Catuscia Palamidessi and
                  M{\'{a}}rio S. Alvim and
                  Miguel E. Andr{\'{e}}s},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Interactive Information Flow - (Invited Talk)},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {111},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_8},
  doi          = {10.1007/978-3-642-16074-5\_8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/PalamidessiAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/PiresC10,
  author       = {M{\'{a}}rio Pires and
                  Lu{\'{\i}}s Caires},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {A Type System for Access Control Views in Object-Oriented Languages},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {59--76},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_5},
  doi          = {10.1007/978-3-642-16074-5\_5},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/PiresC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/SmythRKK10,
  author       = {Ben Smyth and
                  Mark Ryan and
                  Steve Kremer and
                  Mounira Kourjieh},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Towards Automatic Analysis of Election Verifiability Properties},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {146--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_11},
  doi          = {10.1007/978-3-642-16074-5\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/SmythRKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/AdetoyeB09,
  author       = {Adedayo Adetoye and
                  Atta Badii},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {A Policy Model for Secure Information Flow},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_1},
  doi          = {10.1007/978-3-642-03459-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/AdetoyeB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/AldiniB09,
  author       = {Alessandro Aldini and
                  Marco Bernardo},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {A General Framework for Nondeterministic, Probabilistic, and Stochastic
                  Noninterference},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {18--33},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_2},
  doi          = {10.1007/978-3-642-03459-6\_2},
  timestamp    = {Wed, 25 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/AldiniB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/ArsacBCC09,
  author       = {Wihem Arsac and
                  Giampaolo Bella and
                  Xavier Chantry and
                  Luca Compagna},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Validating Security Protocols under the General Attacker},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_3},
  doi          = {10.1007/978-3-642-03459-6\_3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/ArsacBCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Bartoletti09,
  author       = {Massimo Bartoletti},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Usage Automata},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {52--69},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_4},
  doi          = {10.1007/978-3-642-03459-6\_4},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Bartoletti09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BodeiBB09,
  author       = {Chiara Bodei and
                  Linda Brodo and
                  Roberto Bruni},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Static Detection of Logic Flaws in Service-Oriented Applications},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {70--87},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_5},
  doi          = {10.1007/978-3-642-03459-6\_5},
  timestamp    = {Thu, 26 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BodeiBB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/BrobergS09,
  author       = {Niklas Broberg and
                  David Sands},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Improving the Semantics of Imperfect Security},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {88--91},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_6},
  doi          = {10.1007/978-3-642-03459-6\_6},
  timestamp    = {Tue, 09 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/BrobergS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/FroschleS09,
  author       = {Sibylle B. Fr{\"{o}}schle and
                  Graham Steel},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Analysing PKCS{\#}11 Key Management APIs with Unbounded Fresh Data},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_7},
  doi          = {10.1007/978-3-642-03459-6\_7},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/FroschleS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Guttman09,
  author       = {Joshua D. Guttman},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Transformations between Cryptographic Protocols},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_8},
  doi          = {10.1007/978-3-642-03459-6\_8},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Guttman09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Hernandez-ArdietaFR09,
  author       = {Jorge L. Hernandez{-}Ardieta and
                  Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and
                  Benjam{\'{\i}}n Ramos},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Formal Validation of {OFEPSP+} with {AVISPA}},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {124--137},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_9},
  doi          = {10.1007/978-3-642-03459-6\_9},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Hernandez-ArdietaFR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/HutterM09,
  author       = {Dieter Hutter and
                  Ra{\'{u}}l Monroy},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {On the Automated Correction of Protocols with Improper Message Encoding},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {138--154},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_10},
  doi          = {10.1007/978-3-642-03459-6\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/HutterM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/JurjensW09,
  author       = {Jan J{\"{u}}rjens and
                  Tjark Weber},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Finite Models in FOL-Based Crypto-Protocol Verification},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_11},
  doi          = {10.1007/978-3-642-03459-6\_11},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/JurjensW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/KeighrenAS09,
  author       = {Gavin Keighren and
                  David Aspinall and
                  Graham Steel},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Towards a Type System for Security APIs},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {173--192},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_12},
  doi          = {10.1007/978-3-642-03459-6\_12},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/KeighrenAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/MazareW09,
  author       = {Laurent Mazar{\'{e}} and
                  Bogdan Warinschi},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Separating Trace Mapping and Reactive Simulatability Soundness: The
                  Case of Adaptive Corruption},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {193--210},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_13},
  doi          = {10.1007/978-3-642-03459-6\_13},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/MazareW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Ryan09,
  author       = {Peter Y. A. Ryan},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {How Many Election Officials Does It Take to Change an Election?},
  booktitle    = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  pages        = {211--221},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6\_14},
  doi          = {10.1007/978-3-642-03459-6\_14},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Ryan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2009wits,
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Foundations and Applications of Security Analysis, Joint Workshop
                  on Automated Reasoning for Security Protocol Analysis and Issues in
                  the Theory of Security, {ARSPA-WITS} 2009, York, UK, March 28-29,
                  2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5511},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03459-6},
  doi          = {10.1007/978-3-642-03459-6},
  isbn         = {978-3-642-03458-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2009wits.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CaleiroVB05a,
  author       = {Carlos Caleiro and
                  Luca Vigan{\`{o}} and
                  David A. Basin},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Deconstructing Alice and Bob},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {3--22},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.007},
  doi          = {10.1016/J.ENTCS.2005.06.007},
  timestamp    = {Thu, 15 Dec 2022 13:58:28 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/CaleiroVB05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CremersMV05,
  author       = {Cas J. F. Cremers and
                  Sjouke Mauw and
                  Erik P. de Vink},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {A Syntactic Criterion for Injectivity of Authentication Protocols},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {23--38},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.006},
  doi          = {10.1016/J.ENTCS.2005.06.006},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/CremersMV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DSouzaRS05,
  author       = {Deepak D'Souza and
                  K. R. Raghavendra and
                  Barbara Sprick},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {An Automata Based Approach for Verifying Information Flow Properties},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {39--58},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.005},
  doi          = {10.1016/J.ENTCS.2005.06.005},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DSouzaRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DeganoV05,
  author       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Preface},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {1--2},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.008},
  doi          = {10.1016/J.ENTCS.2005.06.008},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DeganoV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/GotsmanMP05,
  author       = {Alexey Gotsman and
                  Fabio Massacci and
                  Marco Pistore},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Towards an Independent Semantics and Verification Technology for the
                  {HLPSL} Specification Language},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {59--77},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.004},
  doi          = {10.1016/J.ENTCS.2005.06.004},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/GotsmanMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ImamotoS05,
  author       = {Kenji Imamoto and
                  Kouichi Sakurai},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time
                  {ID} by {SVO} Logic},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {79--94},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.003},
  doi          = {10.1016/J.ENTCS.2005.06.003},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ImamotoS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/NesiR05,
  author       = {Monica Nesi and
                  Giuseppina Rucci},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol
                  by Rewriting},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {95--114},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.002},
  doi          = {10.1016/J.ENTCS.2005.06.002},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/NesiR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/NielsenAN05,
  author       = {Christoffer Rosenkilde Nielsen and
                  Esben Heltoft Andersen and
                  Hanne Riis Nielson},
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Static Validation of a Voting Protocol},
  booktitle    = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  pages        = {115--134},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.06.001},
  doi          = {10.1016/J.ENTCS.2005.06.001},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/NielsenAN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/arspa/2004,
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/125/issue/1},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arspa/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/arspa/2005,
  editor       = {Pierpaolo Degano and
                  Luca Vigan{\`{o}}},
  title        = {Proceedings of the Second Workshop on Automated Reasoning for Security
                  Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {135},
  number       = {1},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://www.sciencedirect.com/journal/electronic-notes-in-theoretical-computer-science/vol/135/issue/1},
  timestamp    = {Thu, 15 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arspa/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoC05,
  author       = {Alessandro Armando and
                  Luca Compagna},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {An Optimized Intruder Model for SAT-based Model-Checking of Security
                  Protocols},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {91--108},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.021},
  doi          = {10.1016/J.ENTCS.2004.05.021},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ArmandoV05,
  author       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Preface},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {1},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.09.035},
  doi          = {10.1016/J.ENTCS.2004.09.035},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ArmandoV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BondC05,
  author       = {Mike Bond and
                  Jolyon Clulow},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Extending Security Protocol Analysis: New Challenges},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {13--24},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.09.036},
  doi          = {10.1016/J.ENTCS.2004.09.036},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/BondC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CaleiroVB05,
  author       = {Carlos Caleiro and
                  Luca Vigan{\`{o}} and
                  David A. Basin},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Metareasoning about Security Protocols using Distributed Temporal
                  Logic},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {67--89},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.020},
  doi          = {10.1016/J.ENTCS.2004.05.020},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/CaleiroVB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ChevalierKRT05,
  author       = {Yannick Chevalier and
                  Ralf K{\"{u}}sters and
                  Micha{\"{e}}l Rusinowitch and
                  Mathieu Turuani},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Deciding the Security of Protocols with Commuting Public Key Encryption},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {55--66},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.019},
  doi          = {10.1016/J.ENTCS.2004.05.019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/ChevalierKRT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DrielsmaM05,
  author       = {Paul Hankes Drielsma and
                  Sebastian M{\"{o}}dersheim},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {The {ASW} Protocol Revisited: {A} Unified View},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {145--161},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.024},
  doi          = {10.1016/J.ENTCS.2004.05.024},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DrielsmaM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Foley05,
  author       = {Simon N. Foley},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Believing the Integrity of a System: (Invited Talk)},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {3--12},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.09.037},
  doi          = {10.1016/J.ENTCS.2004.09.037},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Foley05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/HaoCJ05,
  author       = {Hao Chen and
                  John A. Clark and
                  Jeremy L. Jacob},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Synthesising Efficient and Effective Security Protocols},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {25--41},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.017},
  doi          = {10.1016/J.ENTCS.2004.05.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/HaoCJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/LynchM05,
  author       = {Christopher Lynch and
                  Catherine Meadows},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {On the Relative Soundness of the Free Algebra Model for Public Key
                  Encryption},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {43--54},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.018},
  doi          = {10.1016/J.ENTCS.2004.05.018},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/LynchM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Mazare05,
  author       = {Laurent Mazar{\'{e}}},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Satisfiability of Dolev-Yao Constraints},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {109--124},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.022},
  doi          = {10.1016/J.ENTCS.2004.05.022},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Mazare05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/SteelB05,
  author       = {Graham Steel and
                  Alan Bundy},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Attacking Group Multicast Key Management Protocols Using Coral},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {125--144},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.023},
  doi          = {10.1016/J.ENTCS.2004.05.023},
  timestamp    = {Tue, 13 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/SteelB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}