Search dblp for Publications

export results for "Protocol Algebra."

 download as .bib file

@article{DBLP:journals/iandc/JacksonP25,
  author       = {J. Jackson and
                  R. Perumal},
  title        = {An algebraic attack on the key exchange protocol based upon a modified
                  tropical structure},
  journal      = {Inf. Comput.},
  volume       = {303},
  pages        = {105259},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.ic.2024.105259},
  doi          = {10.1016/J.IC.2024.105259},
  timestamp    = {Sun, 22 Dec 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/JacksonP25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/NguyenBBNN24,
  author       = {Anh{-}Tu Nguyen and
                  Thanh{-}Lam Bui and
                  Huy Anh Bui and
                  Sy{-}Tai Nguyen and
                  Xuan{-}Thuan Nguyen},
  title        = {Application of hedge algebras algorithm for mobile robot controller
                  via hand gestures and wireless protocol},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {1},
  pages        = {1201--1212},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-232116},
  doi          = {10.3233/JIFS-232116},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/NguyenBBNN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlap/NesterV24,
  author       = {Chad Nester and
                  Niels F. W. Voorneveld},
  title        = {Protocol choice and iteration for the free cornering},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {137},
  pages        = {100942},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jlamp.2023.100942},
  doi          = {10.1016/J.JLAMP.2023.100942},
  timestamp    = {Sat, 17 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlap/NesterV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlhussainiCS24,
  author       = {Sulaiman Alhussaini and
                  Craig Collett and
                  Sergei Sergeev},
  title        = {On the tropical two-sided discrete logarithm and a key exchange protocol
                  based on the tropical algebra of pairs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/010},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlhussainiCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/KumarK23,
  author       = {N. Suresh Kumar and
                  G. Santhosh Kumar},
  title        = {Abstracting IoT protocols using timed process algebra and {SPIN} model
                  checker},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {2},
  pages        = {1611--1629},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-022-03963-y},
  doi          = {10.1007/S10586-022-03963-Y},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/KumarK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlap/FredlundEAS23,
  author       = {Lars{-}{\AA}ke Fredlund and
                  Clara Benac Earle and
                  Thomas Arts and
                  Hans Svensson},
  title        = {Gaining trust by tracing security protocols},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {130},
  pages        = {100829},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jlamp.2022.100829},
  doi          = {10.1016/J.JLAMP.2022.100829},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlap/FredlundEAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlap/LopezRuedaES23,
  author       = {Ra{\'{u}}l L{\'{o}}pez{-}Rueda and
                  Santiago Escobar and
                  Julia Sapi{\~{n}}a},
  title        = {An efficient canonical narrowing implementation with irreducibility
                  and {SMT} constraints for generic symbolic protocol analysis},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {135},
  pages        = {100895},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jlamp.2023.100895},
  doi          = {10.1016/J.JLAMP.2023.100895},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlap/LopezRuedaES23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlap/SavanovicG23,
  author       = {Zorica Savanovic and
                  Letterio Galletta},
  title        = {A type language for distributed reactive components governed by communication
                  protocols},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {132},
  pages        = {100848},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jlamp.2023.100848},
  doi          = {10.1016/J.JLAMP.2023.100848},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlap/SavanovicG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/MordidoS0V23,
  author       = {Andreia Mordido and
                  Janek Spaderna and
                  Peter Thiemann and
                  Vasco T. Vasconcelos},
  title        = {Parameterized Algebraic Protocols},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {7},
  number       = {{PLDI}},
  pages        = {1389--1413},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591277},
  doi          = {10.1145/3591277},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pacmpl/MordidoS0V23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-03764,
  author       = {Andreia Mordido and
                  Janek Spaderna and
                  Peter Thiemann and
                  Vasco T. Vasconcelos},
  title        = {Parameterized Algebraic Protocols},
  journal      = {CoRR},
  volume       = {abs/2304.03764},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.03764},
  doi          = {10.48550/ARXIV.2304.03764},
  eprinttype    = {arXiv},
  eprint       = {2304.03764},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-03764.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Cheikhrouhou22,
  author       = {Lassaad Cheikhrouhou},
  title        = {Inductive verification of cryptographic protocols based on message
                  algebras - trace and indistinguishability properties},
  school       = {Saarland University, Saarbr{\"{u}}cken, Germany},
  year         = {2022},
  url          = {https://publikationen.sulb.uni-saarland.de/handle/20.500.11880/33464},
  urn          = {urn:nbn:de:bsz:291--ds-365586},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Cheikhrouhou22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Bordage22,
  author       = {Sarah Bordage},
  title        = {Efficient protocols for testing proximity to algebraic codes. (Protocoles
                  efficaces pour tester la proximit{\'{e}} {\`{a}} des codes alg{\'{e}}briques)},
  school       = {Polytechnic Institute of Paris, Palaiseau, France},
  year         = {2022},
  url          = {https://tel.archives-ouvertes.fr/tel-03744182},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Bordage22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlap/BavendiekS22,
  author       = {Kai Bavendiek and
                  Sibylle Schupp},
  title        = {A process calculus for privacy-preserving protocols in location-based
                  service systems},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {125},
  pages        = {100735},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jlamp.2021.100735},
  doi          = {10.1016/J.JLAMP.2021.100735},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlap/BavendiekS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlap/KozenS22,
  author       = {Dexter Kozen and
                  Matvey Soloviev},
  title        = {Coalgebraic tools for randomness-conserving protocols},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {125},
  pages        = {100734},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jlamp.2021.100734},
  doi          = {10.1016/J.JLAMP.2021.100734},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlap/KozenS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AnagrehL22,
  author       = {Mohammad Anagreh and
                  Peeter Laud},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Guillermo Navarro{-}Arribas and
                  Nicola Dragoni},
  title        = {A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra
                  Problem},
  booktitle    = {Data Privacy Management, Cryptocurrencies and Blockchain Technology
                  - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022,
                  Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13619},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25734-6\_8},
  doi          = {10.1007/978-3-031-25734-6\_8},
  timestamp    = {Tue, 28 Feb 2023 08:10:09 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AnagrehL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/XiaoNFS22,
  author       = {Junhui Xiao and
                  Ashish Neupane and
                  Hiba F. Fayoumi and
                  Weiqing Sun},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {A Novel Key Exchange Protocol using Logic Algebra for the Factorization
                  Problem},
  booktitle    = {Proceedings of the 8th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11,
                  2022},
  pages        = {396--403},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0010843300003120},
  doi          = {10.5220/0010843300003120},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/XiaoNFS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intelitsis/LetychevskyiPH22,
  author       = {Oleksandr A. Letychevskyi and
                  Volodymyr Peschanenko and
                  Serhii Horbatiuk},
  editor       = {Tetiana Hovorushchenko and
                  Oleg Savenko and
                  Peter T. Popov and
                  Sergii Lysenko},
  title        = {Consensus protocol security analysis using an algebraic virtual machine},
  booktitle    = {Proceedings of the 3rd International Workshop on Intelligent Information
                  Technologies {\&} Systems of Information Security, Khmelnytskyi,
                  Ukraine, March 23-25, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3156},
  pages        = {484--493},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3156/paper37.pdf},
  timestamp    = {Fri, 02 Jun 2023 17:09:30 +0200},
  biburl       = {https://dblp.org/rec/conf/intelitsis/LetychevskyiPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-07964,
  author       = {Mohammad Anagreh and
                  Peeter Laud},
  title        = {A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra
                  Problem},
  journal      = {CoRR},
  volume       = {abs/2207.07964},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.07964},
  doi          = {10.48550/ARXIV.2207.07964},
  eprinttype    = {arXiv},
  eprint       = {2207.07964},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-07964.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-09852,
  author       = {Giorgio Sonnino and
                  Alberto Sonnino},
  title        = {Efficient Multiparty Protocols Using Generalized Parseval's Identity
                  and the Theta Algebra},
  journal      = {CoRR},
  volume       = {abs/2208.09852},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.09852},
  doi          = {10.48550/ARXIV.2208.09852},
  eprinttype    = {arXiv},
  eprint       = {2208.09852},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-09852.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KotovTB22,
  author       = {Matvei Kotov and
                  Alexander Treier and
                  Ivan Buchinskiy},
  title        = {An attack on a key exchange protocol based on max-times and min-times
                  algebras},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1644},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1644},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KotovTB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/Lipinski21,
  author       = {Zbigniew Lipinski},
  title        = {Symmetric and asymmetric cryptographic key exchange protocols in the
                  octonion algebra},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {32},
  number       = {1},
  pages        = {81--96},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00200-019-00402-1},
  doi          = {10.1007/S00200-019-00402-1},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/Lipinski21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/Aziz21,
  author       = {Benjamin Aziz},
  title        = {A process algebraic mutation framework with application to a vehicle
                  charging protocol},
  journal      = {Veh. Commun.},
  volume       = {30},
  pages        = {100352},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.vehcom.2021.100352},
  doi          = {10.1016/J.VEHCOM.2021.100352},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vcomm/Aziz21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwbis/AlmalikS21,
  author       = {Muhammad Ziyad Almalik and
                  Sepha Siswantyo},
  title        = {Modified Dass-Om Protocol for Preventing Algebraic Replay Attacks},
  booktitle    = {6th International Workshop on Big Data and Information Security, {IWBIS}
                  2021, Depok, Indonesia, October 23-25, 2021},
  pages        = {103--108},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IWBIS53353.2021.9631843},
  doi          = {10.1109/IWBIS53353.2021.9631843},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwbis/AlmalikS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-05238,
  author       = {A. S. Sitdikov and
                  A. S. Nikitin},
  title        = {Quantum protocols at presence of non-abelian superselection rules
                  in the framework of algebraic model},
  journal      = {CoRR},
  volume       = {abs/2104.05238},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.05238},
  eprinttype    = {arXiv},
  eprint       = {2104.05238},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-05238.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Lucas20,
  author       = {David Lucas},
  title        = {Secure and efficient outsourced computation protocols for linear algebra.
                  (Protocoles de calculs externalis{\'{e}}s efficaces et s{\'{e}}curis{\'{e}}s
                  pour l'alg{\`{e}}bre lin{\'{e}}aire)},
  school       = {Grenoble Alpes University, France},
  year         = {2020},
  url          = {https://tel.archives-ouvertes.fr/tel-03012730},
  timestamp    = {Tue, 12 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/hal/Lucas20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iwc/FloresGA20,
  author       = {Silvia Berenice Fajardo Flores and
                  Jorge Rafael Gutierrez{-}Pulido and
                  Mar{\'{\i}}a Andrade{-}Ar{\'{e}}chiga},
  title        = {Keyboard-Based Protocol for Typing Algebraic Expressions},
  journal      = {Interact. Comput.},
  volume       = {32},
  number       = {1},
  pages        = {52--65},
  year         = {2020},
  url          = {https://doi.org/10.1093/iwcomp/iwaa004},
  doi          = {10.1093/IWCOMP/IWAA004},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iwc/FloresGA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Daggitt19,
  author       = {Matthew L. Daggitt},
  title        = {An algebraic perspective on the convergence of vector-based routing
                  protocols},
  school       = {University of Cambridge, {UK}},
  year         = {2019},
  url          = {https://doi.org/10.17863/CAM.39222},
  doi          = {10.17863/CAM.39222},
  timestamp    = {Mon, 22 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Daggitt19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlap/AlrahmanV19,
  author       = {Yehia Abd Alrahman and
                  Hugo Torres Vieira},
  title        = {A coordination protocol language for power grid operation control},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {109},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jlamp.2019.100487},
  doi          = {10.1016/J.JLAMP.2019.100487},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlap/AlrahmanV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/WangKMS19,
  author       = {Rui Wang and
                  Lars Michael Kristensen and
                  Hein Meling and
                  Volker Stolz},
  title        = {Automated test case generation for the Paxos single-decree protocol
                  using a Coloured Petri Net model},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {104},
  pages        = {254--273},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jlamp.2019.02.004},
  doi          = {10.1016/J.JLAMP.2019.02.004},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/WangKMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/GlabbeekHM19,
  author       = {Rob van Glabbeek and
                  Peter H{\"{o}}fner and
                  Michael Markl},
  editor       = {Lu{\'{\i}}s Caires},
  title        = {A Process Algebra for Link Layer Protocols},
  booktitle    = {Programming Languages and Systems - 28th European Symposium on Programming,
                  {ESOP} 2019, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2019, Prague, Czech Republic, April
                  6-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11423},
  pages        = {668--693},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17184-1\_24},
  doi          = {10.1007/978-3-030-17184-1\_24},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/GlabbeekHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-13329,
  author       = {Rob van Glabbeek and
                  Peter H{\"{o}}fner and
                  Michael Markl},
  title        = {A Process Algebra for Link Layer Protocols},
  journal      = {CoRR},
  volume       = {abs/1907.13329},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.13329},
  eprinttype    = {arXiv},
  eprint       = {1907.13329},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-13329.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/Zhang18,
  author       = {Yang Zhang},
  title        = {Cryptanalysis of a key exchange protocol based on the ring E\({}_{\mbox{p}}\)\({}^{\mbox{(m)}}\)},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {29},
  number       = {2},
  pages        = {103--112},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00200-017-0332-0},
  doi          = {10.1007/S00200-017-0332-0},
  timestamp    = {Fri, 02 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aaecc/Zhang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Padovani18,
  author       = {Luca Padovani},
  title        = {A type checking algorithm for concurrent object protocols},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {100},
  pages        = {16--35},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jlamp.2018.06.001},
  doi          = {10.1016/J.JLAMP.2018.06.001},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Padovani18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KotovU18,
  author       = {Matvei Kotov and
                  Alexander Ushakov},
  title        = {Analysis of a key exchange protocol based on tropical matrix algebra},
  journal      = {J. Math. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {137--141},
  year         = {2018},
  url          = {https://doi.org/10.1515/jmc-2016-0064},
  doi          = {10.1515/JMC-2016-0064},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KotovU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/RoigAGJ18,
  author       = {Pedro Juan Roig and
                  Salvador Alcaraz and
                  Katja Gilly and
                  Carlos Juiz},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Paulo Novais and
                  Panagiotis G. Sarigiannidis and
                  Sebastiano Battiato and
                  {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {{OSPF} Algebraic Formal Modelling using {ACP} - {A} Formal Description
                  on {OSPF} Routing Protocol},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 1: DCNET, ICE-B, OPTICS,
                  {SIGMAP} and WINSYS, Porto, Portugal, July 26-28, 2018},
  pages        = {221--232},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006838702210232},
  doi          = {10.5220/0006838702210232},
  timestamp    = {Wed, 29 Aug 2018 15:17:08 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/RoigAGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/simultech/RoigAGJ18,
  author       = {Pedro Juan Roig and
                  Salvador Alcaraz and
                  Katja Gilly and
                  Carlos Juiz},
  editor       = {Floriano De Rango and
                  Tuncer I. {\"{O}}ren and
                  Mohammad S. Obaidat},
  title        = {Algebraic Formal Modelling for {EIGRP} using {ACP} - Formal Description
                  Modelling on {EIGRP} Routing Protocol},
  booktitle    = {Proceedings of 8th International Conference on Simulation and Modeling
                  Methodologies, Technologies and Applications, {SIMULTECH} 2018, Porto,
                  Portugal, July 29-31, 2018},
  pages        = {259--266},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006838802590266},
  doi          = {10.5220/0006838802590266},
  timestamp    = {Wed, 29 Aug 2018 15:28:43 +0200},
  biburl       = {https://dblp.org/rec/conf/simultech/RoigAGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/AmariucaiBG18,
  author       = {George T. Amariucai and
                  Sanchita Barman and
                  Yong Guan},
  editor       = {Panos Papadimitratos and
                  Kevin R. B. Butler and
                  Christina P{\"{o}}pper},
  title        = {An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy
                  in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June
                  18-20, 2018},
  pages        = {144--153},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3212480.3212507},
  doi          = {10.1145/3212480.3212507},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/AmariucaiBG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoumanV18,
  author       = {Niek J. Bouman and
                  Niels de Vreede},
  title        = {New Protocols for Secure Linear Algebra: Pivoting-Free Elimination
                  and Fast Block-Recursive Matrix Decomposition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/703},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoumanV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/DelauneH17,
  author       = {St{\'{e}}phanie Delaune and
                  Lucca Hirschi},
  title        = {A survey of symbolic methods for establishing equivalence-based properties
                  in cryptographic protocols},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {87},
  pages        = {127--144},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jlamp.2016.10.005},
  doi          = {10.1016/J.JLAMP.2016.10.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/DelauneH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/LiuZFXLX17,
  author       = {Ailun Liu and
                  Huibiao Zhu and
                  Yuan Fei and
                  Shuangqing Xiang and
                  Gang Lu and
                  Wanling Xie},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Md. Kamrul Hasan},
  title        = {Modeling and Analysis of the Security Protocol in {C-DAX} Based on
                  Process Algebra},
  booktitle    = {41st {IEEE} Annual Computer Software and Applications Conference,
                  {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 1},
  pages        = {39--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMPSAC.2017.170},
  doi          = {10.1109/COMPSAC.2017.170},
  timestamp    = {Mon, 25 Nov 2024 07:52:55 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/LiuZFXLX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/SheZZ17,
  author       = {Jia She and
                  Xiaoran Zhu and
                  Min Zhang},
  editor       = {Xudong He},
  title        = {Algebraic Formalization and Verification of PKMv3 Protocol using Maude},
  booktitle    = {The 29th International Conference on Software Engineering and Knowledge
                  Engineering, Wyndham Pittsburgh University Center, Pittsburgh, PA,
                  USA, July 5-7, 2017},
  pages        = {167--172},
  publisher    = {{KSI} Research Inc. and Knowledge Systems Institute Graduate School},
  year         = {2017},
  url          = {https://doi.org/10.18293/SEKE2017-061},
  doi          = {10.18293/SEKE2017-061},
  timestamp    = {Wed, 03 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/SheZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/BourkeGH16,
  author       = {Timothy Bourke and
                  Rob J. van Glabbeek and
                  Peter H{\"{o}}fner},
  title        = {Mechanizing a Process Algebra for Network Protocols},
  journal      = {J. Autom. Reason.},
  volume       = {56},
  number       = {3},
  pages        = {309--341},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10817-015-9358-9},
  doi          = {10.1007/S10817-015-9358-9},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/BourkeGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Nepeivoda16,
  author       = {Antonina Nepeivoda},
  title        = {Ping-pong protocols as prefix grammars: Modelling and verification
                  via program transformation},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {85},
  number       = {5},
  pages        = {782--804},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jlamp.2016.06.001},
  doi          = {10.1016/J.JLAMP.2016.06.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Nepeivoda16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BlackburnR16,
  author       = {Simon R. Blackburn and
                  Matthew J. B. Robshaw},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {On the Security of the Algebraic Eraser Tag Authentication Protocol},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_1},
  doi          = {10.1007/978-3-319-39555-5\_1},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BlackburnR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcom/FuB16,
  author       = {Chen Fu and
                  Fu Bing},
  editor       = {Meikang Qiu},
  title        = {{SDN} Protocol Analysis with Process Algebra Method},
  booktitle    = {Smart Computing and Communication - First International Conference,
                  SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10135},
  pages        = {95--101},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-52015-5\_10},
  doi          = {10.1007/978-3-319-52015-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcom/FuB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BlackburnR16,
  author       = {Simon R. Blackburn and
                  Matthew J. B. Robshaw},
  title        = {On the security of the Algebraic Eraser tag authentication protocol},
  journal      = {CoRR},
  volume       = {abs/1602.00860},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.00860},
  eprinttype    = {arXiv},
  eprint       = {1602.00860},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BlackburnR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtkinsG16,
  author       = {Derek Atkins and
                  Dorian Goldfeld},
  title        = {Addressing the Algebraic Eraser Diffie-Hellman Over-the-Air Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {205},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/205},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtkinsG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnR16,
  author       = {Simon R. Blackburn and
                  Matthew J. B. Robshaw},
  title        = {On the Security of the Algebraic Eraser Tag Authentication Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {91},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GonzalezMT16,
  title        = {Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {737},
  year         = {2016},
  note         = {Withdrawn.},
  url          = {http://eprint.iacr.org/2016/737},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GonzalezMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/EkbergGS015,
  author       = {Pontus Ekberg and
                  Nan Guan and
                  Martin Stigge and
                  Wang Yi},
  title        = {An optimal resource sharing protocol for generalized multiframe tasks},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {84},
  number       = {1},
  pages        = {92--105},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jlamp.2014.10.001},
  doi          = {10.1016/J.JLAMP.2014.10.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/EkbergGS015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AsgharSLKP15,
  author       = {Hassan Jameel Asghar and
                  Ron Steinfeld and
                  Shujun Li and
                  Mohamed Ali K{\^{a}}afar and
                  Josef Pieprzyk},
  title        = {On the Linearization of Human Identification Protocols: Attacks Based
                  on Linear Algebra, Coding Theory, and Lattices},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1643--1655},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2421875},
  doi          = {10.1109/TIFS.2015.2421875},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AsgharSLKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/LafourcadeP15,
  author       = {Pascal Lafourcade and
                  Maxime Puys},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Evangelos Kranakis and
                  Guillaume Bonfante},
  title        = {Performance Evaluations of Cryptographic Protocols Verification Tools
                  Dealing with Algebraic Properties},
  booktitle    = {Foundations and Practice of Security - 8th International Symposium,
                  {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9482},
  pages        = {137--155},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30303-1\_9},
  doi          = {10.1007/978-3-319-30303-1\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/LafourcadeP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BourkeGH15a,
  author       = {Timothy Bourke and
                  Rob J. van Glabbeek and
                  Peter H{\"{o}}fner},
  title        = {Mechanizing a Process Algebra for Network Protocols},
  journal      = {CoRR},
  volume       = {abs/1512.07304},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.07304},
  eprinttype    = {arXiv},
  eprint       = {1512.07304},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BourkeGH15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KotovU15,
  author       = {Matvei Kotov and
                  Alexander Ushakov},
  title        = {Analysis of a key exchange protocol based on tropical matrix algebra},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {852},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/852},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KotovU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KreuzerMU14,
  author       = {Martin Kreuzer and
                  Alexey D. Myasnikov and
                  Alexander Ushakov},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {37--43},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_3},
  doi          = {10.1007/978-3-319-07536-5\_3},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/KreuzerMU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apn/PuraB14,
  author       = {Mihai{-}Lica Pura and
                  Didier Buchs},
  editor       = {Daniel Moldt and
                  Heiko R{\"{o}}lke},
  title        = {Using Symbolic Techniques and Algebraic Petri Nets to Model Check
                  Security Protocols for Ad Hoc Networks},
  booktitle    = {Proceedings of the International Workshop on Petri Nets and Software
                  Engineering, co-located with 35th International Conference on Application
                  and Theory of Petri Nets and Concurrency (PetriNets 2014) and 14th
                  International Conference on Application of Concurrency to System Design
                  {(ACSD} 2014), Tunis, Tunisia, June 23-24, 2014},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {1160},
  pages        = {91--110},
  publisher    = {CEUR-WS.org},
  year         = {2014},
  url          = {https://ceur-ws.org/Vol-1160/paper6.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:39 +0100},
  biburl       = {https://dblp.org/rec/conf/apn/PuraB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/RochaM14,
  author       = {Camilo Rocha and
                  Jos{\'{e}} Meseguer},
  editor       = {Shusaku Iida and
                  Jos{\'{e}} Meseguer and
                  Kazuhiro Ogata},
  title        = {Mechanical Analysis of Reliable Communication in the Alternating Bit
                  Protocol Using the Maude Invariant Analyzer Tool},
  booktitle    = {Specification, Algebra, and Software - Essays Dedicated to Kokichi
                  Futatsugi},
  series       = {Lecture Notes in Computer Science},
  volume       = {8373},
  pages        = {603--629},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54624-2\_30},
  doi          = {10.1007/978-3-642-54624-2\_30},
  timestamp    = {Thu, 21 Sep 2023 09:08:34 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/RochaM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/depcos/FrolovV14,
  author       = {Alexander Frolov and
                  Alexander Vinnikov},
  editor       = {Wojciech Zamojski and
                  Jacek Mazurkiewicz and
                  Jaroslaw Sugier and
                  Tomasz Walkowiak and
                  Janusz Kacprzyk},
  title        = {{FSM} Simulation of Cryptographic Protocols Using Algebraic Processor},
  booktitle    = {Proceedings of the Ninth International Conference on Dependability
                  and Complex Systems DepCoS-RELCOMEX. June 30 - July 4, 2014, Brun{\'{o}}w,
                  Poland},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {286},
  pages        = {189--198},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07013-1\_18},
  doi          = {10.1007/978-3-319-07013-1\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/depcos/FrolovV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccomm/PuraB14,
  author       = {Mihai{-}Lica Pura and
                  Didier Buchs},
  title        = {Model checking {ARAN} ad hoc secure routing protocol with algebraic
                  Petri nets},
  booktitle    = {10th International Conference on Communications, {COMM} 2014, Bucharest,
                  Romania, May 29-31, 2014},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICComm.2014.6866692},
  doi          = {10.1109/ICCOMM.2014.6866692},
  timestamp    = {Fri, 01 Apr 2022 12:37:24 +0200},
  biburl       = {https://dblp.org/rec/conf/iccomm/PuraB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/PuraB14,
  author       = {Mihai{-}Lica Pura and
                  Didier Buchs},
  title        = {Using Algebraic Petri Nets for Testing the Models of Ad Hoc Secure
                  Routing Protocols in Mobility Scenarios},
  booktitle    = {Seventh {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April
                  4, 2014, Cleveland, Ohio, {USA}},
  pages        = {2--3},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICSTW.2014.64},
  doi          = {10.1109/ICSTW.2014.64},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/PuraB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/YuNRWCX14,
  author       = {Yong Yu and
                  Jianbing Ni and
                  Jian Ren and
                  Wei Wu and
                  Lanxiang Chen and
                  Qi Xia},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {Improvement of a Remote Data Possession Checking Protocol from Algebraic
                  Signatures},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {359--372},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_27},
  doi          = {10.1007/978-3-319-06320-1\_27},
  timestamp    = {Tue, 20 Aug 2024 07:54:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/YuNRWCX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itp/BourkeGH14,
  author       = {Timothy Bourke and
                  Rob J. van Glabbeek and
                  Peter H{\"{o}}fner},
  editor       = {Gerwin Klein and
                  Ruben Gamboa},
  title        = {Showing Invariance Compositionally for a Process Algebra for Network
                  Protocols},
  booktitle    = {Interactive Theorem Proving - 5th International Conference, {ITP}
                  2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna,
                  Austria, July 14-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8558},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08970-6\_10},
  doi          = {10.1007/978-3-319-08970-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/itp/BourkeGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BarrealHKL14,
  author       = {Amaro Barreal and
                  Camilla Hollanti and
                  David A. Karpuk and
                  Hsiao{-}feng Lu},
  title        = {Algebraic Codes and a New Physical Layer Transmission Protocol for
                  Wireless Distributed Storage Systems},
  journal      = {CoRR},
  volume       = {abs/1405.4375},
  year         = {2014},
  url          = {http://arxiv.org/abs/1405.4375},
  eprinttype    = {arXiv},
  eprint       = {1405.4375},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BarrealHKL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BourkeGH14,
  author       = {Timothy Bourke and
                  Rob J. van Glabbeek and
                  Peter H{\"{o}}fner},
  title        = {Showing invariance compositionally for a process algebra for network
                  protocols},
  journal      = {CoRR},
  volume       = {abs/1407.3519},
  year         = {2014},
  url          = {http://arxiv.org/abs/1407.3519},
  eprinttype    = {arXiv},
  eprint       = {1407.3519},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/BourkeGH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AsgharSLKP14,
  author       = {Hassan Jameel Asghar and
                  Ron Steinfeld and
                  Shujun Li and
                  Dali Kaafar and
                  Josef Pieprzyk},
  title        = {Algebraic Attacks on Human Identification Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {767},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/767},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AsgharSLKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/WuZZWL13,
  author       = {Xi Wu and
                  Huibiao Zhu and
                  Yongxin Zhao and
                  Zheng Wang and
                  Si Liu},
  title        = {Modeling and verifying the Ariadne protocol using process algebra},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {10},
  number       = {1},
  pages        = {393--421},
  year         = {2013},
  url          = {https://doi.org/10.2298/CSIS120601009W},
  doi          = {10.2298/CSIS120601009W},
  timestamp    = {Fri, 16 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/WuZZWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secnet/ChikoucheFB13,
  author       = {Noureddine Chikouche and
                  Cherif Foudil and
                  Mohamed Benmohammed},
  editor       = {Ali Ismail Awad and
                  Aboul Ella Hassanien and
                  Kensuke Baba},
  title        = {Algebraic Replay Attacks on Authentication in {RFID} Protocols},
  booktitle    = {Advances in Security of Information and Communication Networks - First
                  International Conference, SecNet 2013, Cairo, Egypt, September 3-5,
                  2013. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {381},
  pages        = {153--163},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40597-6\_13},
  doi          = {10.1007/978-3-642-40597-6\_13},
  timestamp    = {Wed, 19 May 2021 08:32:23 +0200},
  biburl       = {https://dblp.org/rec/conf/secnet/ChikoucheFB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sera/OuranosS13,
  author       = {Iakovos Ouranos and
                  Petros S. Stefaneas},
  editor       = {Roger Y. Lee},
  title        = {Towards a Protocol Algebra Based on Algebraic Specifications},
  booktitle    = {Software Engineering Research, Management and Applications [selected
                  papers from the 11th International Conference on Software Engineering
                  Research, Management and Applications, {SERA} 2013, Prague, Czech
                  Republic, August 7-9, 2013]},
  series       = {Studies in Computational Intelligence},
  volume       = {496},
  pages        = {85--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-00948-3\_6},
  doi          = {10.1007/978-3-319-00948-3\_6},
  timestamp    = {Fri, 19 May 2017 01:26:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sera/OuranosS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/KamalY12,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Cryptanalysis of a key exchange protocol based on the endomorphisms
                  ring End ({\(\mathbb{Z}\)}\({}_{\mbox{p}}\) {\texttimes} {\(\mathbb{Z}\)}\({}_{\mbox{p\({}^{\mbox{2}}\)}}\))},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {23},
  number       = {3-4},
  pages        = {143--149},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00200-012-0170-z},
  doi          = {10.1007/S00200-012-0170-Z},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/KamalY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/KazemeyniJOB12,
  author       = {Fatemeh Kazemeyni and
                  Einar Broch Johnsen and
                  Olaf Owe and
                  Ilangko Balasingham},
  title        = {Formal modeling and validation of a power-efficient grouping protocol
                  for WSNs},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {81},
  number       = {3},
  pages        = {284--297},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jlap.2011.12.001},
  doi          = {10.1016/J.JLAP.2011.12.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/KazemeyniJOB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/MateescuPS12,
  author       = {Radu Mateescu and
                  Pascal Poizat and
                  Gwen Sala{\"{u}}n},
  title        = {Adaptation of Service Protocols Using Process Algebra and On-the-Fly
                  Reduction Techniques},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {38},
  number       = {4},
  pages        = {755--777},
  year         = {2012},
  url          = {https://doi.org/10.1109/TSE.2011.62},
  doi          = {10.1109/TSE.2011.62},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tse/MateescuPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccis/TianW12a,
  author       = {Xiaoming Tian and
                  Qiuxin Wu},
  title        = {An approach to improve process algebra based protocol composition
                  model},
  booktitle    = {2nd {IEEE} International Conference on Cloud Computing and Intelligence
                  Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012},
  pages        = {666--669},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CCIS.2012.6664258},
  doi          = {10.1109/CCIS.2012.6664258},
  timestamp    = {Sun, 08 Aug 2021 01:40:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ccis/TianW12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/DoughertyG12,
  author       = {Daniel J. Dougherty and
                  Joshua D. Guttman},
  editor       = {Catuscia Palamidessi and
                  Mark Dermot Ryan},
  title        = {An Algebra for Symbolic Diffie-Hellman Protocol Analysis},
  booktitle    = {Trustworthy Global Computing - 7th International Symposium, {TGC}
                  2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8191},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-41157-1\_11},
  doi          = {10.1007/978-3-642-41157-1\_11},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/DoughertyG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-8114,
  author       = {Boaz Tsaban},
  title        = {Polynomial time cryptanalysis of noncommutative-algebraic key exchange
                  protocols},
  journal      = {CoRR},
  volume       = {abs/1210.8114},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.8114},
  eprinttype    = {arXiv},
  eprint       = {1210.8114},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-8114.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Tsaban12,
  author       = {Boaz Tsaban},
  title        = {Polynomial time cryptanalysis of noncommutative-algebraic key exchange
                  protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Tsaban12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/CarlK11,
  author       = {Glenn Carl and
                  George Kesidis},
  title        = {Modeling a policy-capable path-vector routing protocol using Jacobi
                  iteration over a path algebra},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {10},
  pages        = {2361--2379},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2011.03.013},
  doi          = {10.1016/J.COMNET.2011.03.013},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/CarlK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eceasst/BhandalBH11,
  author       = {Colm Bhandal and
                  M{\'{e}}lanie Bouroche and
                  Arthur Hughes},
  title        = {A Process Algebraic Description of a Temporal Wireless Network Protocol},
  journal      = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.},
  volume       = {45},
  year         = {2011},
  url          = {https://doi.org/10.14279/tuj.eceasst.45.660},
  doi          = {10.14279/TUJ.ECEASST.45.660},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eceasst/BhandalBH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1110-0732,
  author       = {Iaakov Exman and
                  Radel Ben{-}Av},
  title        = {Z-States Algebra for a Tunable Multi-Party Entanglement-Distillation
                  Protocol},
  journal      = {CoRR},
  volume       = {abs/1110.0732},
  year         = {2011},
  url          = {http://arxiv.org/abs/1110.0732},
  eprinttype    = {arXiv},
  eprint       = {1110.0732},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1110-0732.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cca/project10,
  author       = {The SCIEnce project},
  title        = {Symbolic computation software composability protocol and its implementations},
  journal      = {{ACM} Commun. Comput. Algebra},
  volume       = {44},
  number       = {3/4},
  pages        = {210--212},
  year         = {2010},
  url          = {https://doi.org/10.1145/1940475.1940522},
  doi          = {10.1145/1940475.1940522},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cca/project10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1003-5385,
  author       = {Sreekanth Malladi and
                  Pascal Lafourcade},
  title        = {How to prevent type-flaw attacks on security protocols under algebraic
                  properties},
  journal      = {CoRR},
  volume       = {abs/1003.5385},
  year         = {2010},
  url          = {http://arxiv.org/abs/1003.5385},
  eprinttype    = {arXiv},
  eprint       = {1003.5385},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1003-5385.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yagisawa10a,
  author       = {Masahiro Yagisawa},
  title        = {Key Agreement Protocols Based on Multivariate Algebraic Equations
                  on Quaternion Ring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yagisawa10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/PetrakosDMS09,
  author       = {Nikolaos Petrakos and
                  George W. Dinolt and
                  James Bret Michael and
                  Pantelimon Stanica},
  title        = {Cube-Type Algebraic Attacks on Wireless Encryption Protocols},
  journal      = {Computer},
  volume       = {42},
  number       = {10},
  pages        = {103--105},
  year         = {2009},
  url          = {https://doi.org/10.1109/MC.2009.318},
  doi          = {10.1109/MC.2009.318},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/PetrakosDMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Ramezanian09,
  author       = {Rasoul Ramezanian},
  title        = {Process algebraic modeling of authentication protocols for analysis
                  of parallel multi-session executions},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {55--67},
  year         = {2009},
  url          = {https://doi.org/10.22042/isecure.2015.1.1.6},
  doi          = {10.22042/ISECURE.2015.1.1.6},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Ramezanian09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Jurjens09,
  author       = {Jan J{\"{u}}rjens},
  title        = {A domain-specific language for cryptographic protocols based on streams},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {78},
  number       = {2},
  pages        = {54--73},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jlap.2008.08.006},
  doi          = {10.1016/J.JLAP.2008.08.006},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Jurjens09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ideas/CrassKS09,
  author       = {Stefan Cra{\ss} and
                  Eva K{\"{u}}hn and
                  Gernot Salzer},
  editor       = {Bipin C. Desai and
                  Domenico Sacc{\`{a}} and
                  Sergio Greco},
  title        = {Algebraic foundation of a data model for an extensible space-based
                  collaboration protocol},
  booktitle    = {International Database Engineering and Applications Symposium {(IDEAS}
                  2009), September 16-18, 2009, Cetraro, Calabria, Italy},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {301--306},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1620432.1620466},
  doi          = {10.1145/1620432.1620466},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ideas/CrassKS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/BursucC09,
  author       = {Sergiu Bursuc and
                  Hubert Comon{-}Lundh},
  editor       = {Ralf Treinen},
  title        = {Protocol Security and Algebraic Properties: Decision Results for a
                  Bounded Number of Sessions},
  booktitle    = {Rewriting Techniques and Applications, 20th International Conference,
                  {RTA} 2009, Bras{\'{\i}}lia, Brazil, June 29 - July 1, 2009,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5595},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02348-4\_10},
  doi          = {10.1007/978-3-642-02348-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/BursucC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/DeursenR09,
  author       = {Ton van Deursen and
                  Sasa Radomirovic},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Algebraic Attacks on {RFID} Protocols},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {38--51},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_4},
  doi          = {10.1007/978-3-642-03944-7\_4},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/DeursenR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BoichutHK09,
  author       = {Yohan Boichut and
                  Pierre{-}Cyrille H{\'{e}}am and
                  Olga Kouchnarenko},
  editor       = {Peter Habermehl and
                  Tom{\'{a}}s Vojnar},
  title        = {Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic
                  Primitives},
  booktitle    = {Joint Proceedings of the 8th, 9th, and 10th International Workshops
                  on Verification of Infinite-State Systems, {INFINITY} 2006 / 2007
                  / 2008, Bonn, Germany, August 26, 2006 / Lisbon, Portugal, September
                  8, 2007 / Toronto, Canada, August 23, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {239},
  pages        = {57--72},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.entcs.2009.05.030},
  doi          = {10.1016/J.ENTCS.2009.05.030},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/BoichutHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/0001S09,
  author       = {Matthias Krause and
                  Dirk Stegemann},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {Algebraic Attacks against Linear {RFID} Authentication Protocols},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1957/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/0001S09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/BlanchetAF08,
  author       = {Bruno Blanchet and
                  Mart{\'{\i}}n Abadi and
                  C{\'{e}}dric Fournet},
  title        = {Automated verification of selected equivalences for security protocols},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {75},
  number       = {1},
  pages        = {3--51},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jlap.2007.06.002},
  doi          = {10.1016/J.JLAP.2007.06.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/BlanchetAF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Kramer08,
  author       = {Simon Kramer},
  title        = {Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {77},
  number       = {1-2},
  pages        = {60--91},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jlap.2008.05.005},
  doi          = {10.1016/J.JLAP.2008.05.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Kramer08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/McIverGCM08,
  author       = {A. K. McIver and
                  Carlos Gonzal{\'{\i}}a and
                  Ernie Cohen and
                  Carroll C. Morgan},
  title        = {Using probabilistic Kleene algebra pKA for protocol verification},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {76},
  number       = {1},
  pages        = {90--111},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.jlap.2007.10.005},
  doi          = {10.1016/J.JLAP.2007.10.005},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlp/McIverGCM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OstrovskyS08,
  author       = {Rafail Ostrovsky and
                  William E. Skeith III},
  editor       = {David A. Wagner},
  title        = {Communication Complexity in Algebraic Two-Party Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {379--396},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_21},
  doi          = {10.1007/978-3-540-85174-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OstrovskyS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnsc/TanGL08,
  author       = {Fuxiao Tan and
                  Xinping Guan and
                  Derong Liu},
  title        = {The consensus protocol for multi-agent systems based on the algebraic
                  connectivity},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networking,
                  Sensing and Control, {ICNSC} 2008, Hainan, China, 6-8 April 2008},
  pages        = {310--313},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICNSC.2008.4525231},
  doi          = {10.1109/ICNSC.2008.4525231},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnsc/TanGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsoc/MateescuPS08,
  author       = {Radu Mateescu and
                  Pascal Poizat and
                  Gwen Sala{\"{u}}n},
  editor       = {Athman Bouguettaya and
                  Ingolf Kr{\"{u}}ger and
                  Tiziana Margaria},
  title        = {Adaptation of Service Protocols Using Process Algebra and On-the-Fly
                  Reduction Techniques},
  booktitle    = {Service-Oriented Computing - {ICSOC} 2008, 6th International Conference,
                  Sydney, Australia, December 1-5, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5364},
  pages        = {84--99},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89652-4\_10},
  doi          = {10.1007/978-3-540-89652-4\_10},
  timestamp    = {Sun, 02 Jun 2019 21:20:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icsoc/MateescuPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0802-3328,
  author       = {Manas K. Patra and
                  Yan Zhang},
  title        = {An Algebraic Characterization of Security of Cryptographic Protocols},
  journal      = {CoRR},
  volume       = {abs/0802.3328},
  year         = {2008},
  url          = {http://arxiv.org/abs/0802.3328},
  eprinttype    = {arXiv},
  eprint       = {0802.3328},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0802-3328.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aamas/MallyaS07,
  author       = {Ashok U. Mallya and
                  Munindar P. Singh},
  title        = {An algebra for commitment protocols},
  journal      = {Auton. Agents Multi Agent Syst.},
  volume       = {14},
  number       = {2},
  pages        = {143--163},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10458-006-7232-1},
  doi          = {10.1007/S10458-006-7232-1},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aamas/MallyaS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/DelicataS07,
  author       = {Rob Delicata and
                  Steve A. Schneider},
  title        = {An algebraic approach to the verification of a class of Diffie-Hellman
                  protocols},
  journal      = {Int. J. Inf. Sec.},
  volume       = {6},
  number       = {2-3},
  pages        = {183--196},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10207-007-0013-2},
  doi          = {10.1007/S10207-007-0013-2},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/DelicataS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/BaldoniBMP07,
  author       = {Matteo Baldoni and
                  Cristina Baroglio and
                  Alberto Martelli and
                  Viviana Patti},
  title        = {Reasoning about interaction protocols for customizing web service
                  selection and composition},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {70},
  number       = {1},
  pages        = {53--73},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jlap.2006.05.005},
  doi          = {10.1016/J.JLAP.2006.05.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/BaldoniBMP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/JohnsonLLV07,
  author       = {James E. Johnson and
                  David E. Langworthy and
                  Leslie Lamport and
                  Friedrich H. Vogt},
  title        = {Formal specification of a Web services protocol},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {70},
  number       = {1},
  pages        = {34--52},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jlap.2006.05.004},
  doi          = {10.1016/J.JLAP.2006.05.004},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/JohnsonLLV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/PangFHV07,
  author       = {Jun Pang and
                  Wan J. Fokkink and
                  Rutger F. H. Hofman and
                  Ronald Veldema},
  title        = {Model checking a cache coherence protocol of a Java {DSM} implementation},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {71},
  number       = {1},
  pages        = {1--43},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.jlap.2006.08.007},
  doi          = {10.1016/J.JLAP.2006.08.007},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/PangFHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bis/Picard07,
  author       = {Willy Picard},
  editor       = {Witold Abramowicz},
  title        = {An Algebraic Algorithm for Structural Validation of Social Protocols},
  booktitle    = {Business Information Systems, 10th International Conference, {BIS}
                  2007, Poznan, Poland, April 25-27, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4439},
  pages        = {570--583},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72035-5\_45},
  doi          = {10.1007/978-3-540-72035-5\_45},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/bis/Picard07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cai/OuranosS07,
  author       = {Iakovos Ouranos and
                  Petros S. Stefaneas},
  editor       = {Symeon Bozapalidis and
                  George Rahonis},
  title        = {Verifying Security Protocols for Sensor Networks Using Algebraic Specification
                  Techniques},
  booktitle    = {Algebraic Informatics, Second International Conference, {CAI} 2007,
                  Thessaloniki, Greece, May 21-25, 2007, Revised Selected and Invited
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4728},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75414-5\_16},
  doi          = {10.1007/978-3-540-75414-5\_16},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cai/OuranosS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/calco/FiadeiroS07,
  author       = {Jos{\'{e}} Luiz Fiadeiro and
                  Vincent Schmitt},
  editor       = {Till Mossakowski and
                  Ugo Montanari and
                  Magne Haveraaen},
  title        = {Structured Co-spans: An Algebra of Interaction Protocols},
  booktitle    = {Algebra and Coalgebra in Computer Science, Second International Conference,
                  {CALCO} 2007, Bergen, Norway, August 20-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4624},
  pages        = {194--208},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73859-6\_14},
  doi          = {10.1007/978-3-540-73859-6\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/calco/FiadeiroS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/TrincaR07,
  author       = {Dragos Trinca and
                  Sanguthevar Rajasekaran},
  title        = {Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving
                  Association Rule Mining in Vertically Partitioned Data},
  booktitle    = {Proceedings of the 26th {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New
                  Orleans, Louisiana, {USA}},
  pages        = {402--409},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PCCC.2007.358920},
  doi          = {10.1109/PCCC.2007.358920},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/TrincaR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/VereshchaginBCKLP07,
  author       = {Nikolai K. Vereshchagin and
                  Harry Buhrman and
                  Matthias Christandl and
                  Michal Kouck{\'{y}} and
                  Zvi Lotker and
                  Boaz Patt{-}Shamir},
  editor       = {Manindra Agrawal and
                  Harry Buhrman and
                  Lance Fortnow and
                  Thomas Thierauf},
  title        = {High Entropy Random Selection Protocols},
  booktitle    = {Algebraic Methods in Computational Complexity, 07.10. - 12.10.2007},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {07411},
  publisher    = {Internationales Begegnungs- und Forschungszentrum fuer Informatik
                  (IBFI), Schloss Dagstuhl, Germany},
  year         = {2007},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2008/1309},
  timestamp    = {Thu, 10 Jun 2021 13:02:08 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/VereshchaginBCKLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Delaune06,
  author       = {St{\'{e}}phanie Delaune},
  title        = {V{\'{e}}rification des protocoles cryptographiques et propri{\'{e}}t{\'{e}}s
                  alg{\'{e}}briques. (Verification of cryptographic protocols with
                  algebraic properties)},
  school       = {{\'{E}}cole normale sup{\'{e}}rieure de Cachan, France},
  year         = {2006},
  url          = {https://tel.archives-ouvertes.fr/tel-00132677},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Delaune06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/AnshelAG06,
  author       = {Iris Anshel and
                  Michael Anshel and
                  Dorian Goldfeld},
  title        = {A Linear Time Matrix Key Agreement Protocol Over Small Finite Fields},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {17},
  number       = {3-4},
  pages        = {195--203},
  year         = {2006},
  url          = {https://doi.org/10.1007/s00200-006-0001-1},
  doi          = {10.1007/S00200-006-0001-1},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/AnshelAG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/TalpinG06,
  author       = {Jean{-}Pierre Talpin and
                  Paul {Le Guernic}},
  title        = {An algebraic theory for behavioral modeling and protocol synthesis
                  in system design},
  journal      = {Formal Methods Syst. Des.},
  volume       = {28},
  number       = {2},
  pages        = {131--151},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10703-006-7845-7},
  doi          = {10.1007/S10703-006-7845-7},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fmsd/TalpinG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CortierDL06,
  author       = {V{\'{e}}ronique Cortier and
                  St{\'{e}}phanie Delaune and
                  Pascal Lafourcade},
  title        = {A survey of algebraic properties used in cryptographic protocols},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {1--43},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14101},
  doi          = {10.3233/JCS-2006-14101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CortierDL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/RelMiCS/McIverCM06,
  author       = {Annabelle McIver and
                  Ernie Cohen and
                  Carroll Morgan},
  editor       = {Renate A. Schmidt},
  title        = {Using Probabilistic Kleene Algebra for Protocol Verification},
  booktitle    = {Relations and Kleene Algebra in Computer Science, 9th International
                  Conference on Relational Methods in Computer Science and 4th International
                  Workshop on Applications of Kleene Algebra, RelMiCS/AKA 2006, Manchester,
                  UK, August 29-September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4136},
  pages        = {296--310},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11828563\_20},
  doi          = {10.1007/11828563\_20},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/RelMiCS/McIverCM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esaw/MillerM06,
  author       = {Tim Miller and
                  Peter McBurney},
  editor       = {Gregory M. P. O'Hare and
                  Alessandro Ricci and
                  Michael J. O'Grady and
                  Oguz Dikenelli},
  title        = {Using Constraints and Process Algebra for Specification of First-Class
                  Agent Interaction Protocols},
  booktitle    = {Engineering Societies in the Agents World VII, 7th International Workshop,
                  {ESAW} 2006, Dublin, Ireland, September 6-8, 2006 Revised Selected
                  and Invited Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4457},
  pages        = {245--264},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-75524-1\_14},
  doi          = {10.1007/978-3-540-75524-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/esaw/MillerM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictac/BoichutHK06,
  author       = {Yohan Boichut and
                  Pierre{-}Cyrille H{\'{e}}am and
                  Olga Kouchnarenko},
  editor       = {Kamel Barkaoui and
                  Ana Cavalcanti and
                  Antonio Cerone},
  title        = {Handling Algebraic Properties in Automatic Analysis of Security Protocols},
  booktitle    = {Theoretical Aspects of Computing - {ICTAC} 2006, Third International
                  Colloquium, Tunis, Tunisia, November 20-24, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4281},
  pages        = {153--167},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11921240\_11},
  doi          = {10.1007/11921240\_11},
  timestamp    = {Mon, 21 Feb 2022 14:40:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ictac/BoichutHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscc/Hagalisletto06,
  author       = {Anders Moen Hagalisletto},
  editor       = {Paolo Bellavista and
                  Chi{-}Ming Chen and
                  Antonio Corradi and
                  Mahmoud Daneshmand},
  title        = {Protocol Algebra},
  booktitle    = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications
                  {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy},
  pages        = {394--401},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ISCC.2006.133},
  doi          = {10.1109/ISCC.2006.133},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iscc/Hagalisletto06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/RuizCCP06,
  author       = {M. Carmen Ruiz and
                  Diego Cazorla and
                  Fernando Cuartero and
                  Juan Jos{\'{e}} Pardo},
  editor       = {Hisham Haddad},
  title        = {Analysis of the {SET} e-commerce protocol using a true concurrency
                  process algebra},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {879--886},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141480},
  doi          = {10.1145/1141277.1141480},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/RuizCCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BistarelliCLM05,
  author       = {Stefano Bistarelli and
                  Iliano Cervesato and
                  Gabriele Lenzini and
                  Fabio Martinelli},
  title        = {Relating multiset rewriting and process algebras for security protocol
                  analysis},
  journal      = {J. Comput. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {3--47},
  year         = {2005},
  url          = {https://doi.org/10.3233/jcs-2005-13102},
  doi          = {10.3233/JCS-2005-13102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BistarelliCLM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Amadio05,
  author       = {Roberto M. Amadio},
  title        = {Guest editor's introduction: Special issue on Modelling and Verification
                  of Cryptographic Protocols},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {155},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.001},
  doi          = {10.1016/J.JLAP.2004.09.001},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Amadio05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/BozgaEL05,
  author       = {Liana Bozga and
                  Cristian Ene and
                  Yassine Lakhnech},
  title        = {A symbolic decision procedure for cryptographic protocols with time
                  stamps},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {65},
  number       = {1},
  pages        = {1--35},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.007},
  doi          = {10.1016/J.JLAP.2004.09.007},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/BozgaEL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/EvansS05,
  author       = {Neil Evans and
                  Steve A. Schneider},
  title        = {Verifying security protocols with {PVS:} widening the rank function
                  approach},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {253--284},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.005},
  doi          = {10.1016/J.JLAP.2004.09.005},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/EvansS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Goubault-LarrecqRV05,
  author       = {Jean Goubault{-}Larrecq and
                  Muriel Roger and
                  Kumar Neeraj Verma},
  title        = {Abstraction and resolution modulo {AC:} How to verify Diffie-Hellman-like
                  protocols automatically},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {64},
  number       = {2},
  pages        = {219--251},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.jlap.2004.09.004},
  doi          = {10.1016/J.JLAP.2004.09.004},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Goubault-LarrecqRV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/synasc/CiobanuS05,
  author       = {Gabriel Ciobanu and
                  K. N. Sridhar},
  editor       = {Daniela Zaharie and
                  Dana Petcu and
                  Viorel Negru and
                  Tudor Jebelean and
                  Gabriel Ciobanu and
                  Alexandru Cicortas and
                  Ajith Abraham and
                  Marcin Paprzycki},
  title        = {Specifications and Verification of Network Protocols by Process Algebra},
  booktitle    = {Seventh International Symposium on Symbolic and Numeric Algorithms
                  for Scientific Computing {(SYNASC} 2005), 25-29 September 2005, Timisoara,
                  Romania},
  pages        = {250--258},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/SYNASC.2005.68},
  doi          = {10.1109/SYNASC.2005.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/synasc/CiobanuS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuaiL04,
  author       = {Jinpeng Huai and
                  Xianxian Li},
  title        = {Algebra model and security analysis for cryptographic protocols},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {47},
  number       = {2},
  pages        = {199--220},
  year         = {2004},
  url          = {https://doi.org/10.1360/02yf0185},
  doi          = {10.1360/02YF0185},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuaiL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JmaielP03,
  author       = {Mohamed Jmaiel and
                  Peter Pepper},
  title        = {Development of communication protocols using algebraic and temporal
                  specifications},
  journal      = {Comput. Networks},
  volume       = {42},
  number       = {6},
  pages        = {737--764},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1389-1286(03)00215-9},
  doi          = {10.1016/S1389-1286(03)00215-9},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/JmaielP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/GorrieriM03,
  author       = {Roberto Gorrieri and
                  Fabio Martinelli},
  editor       = {Branislav Rovan and
                  Peter Vojt{\'{a}}s},
  title        = {Process Algebraic Frameworks for the Specification and Analysis of
                  Cryptographic Protocols},
  booktitle    = {Mathematical Foundations of Computer Science 2003, 28th International
                  Symposium, {MFCS} 2003, Bratislava, Slovakia, August 25-29, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2747},
  pages        = {46--67},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45138-9\_3},
  doi          = {10.1007/978-3-540-45138-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/GorrieriM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/BistarelliCLM03,
  author       = {Stefano Bistarelli and
                  Iliano Cervesato and
                  Gabriele Lenzini and
                  Fabio Martinelli},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Relating Process Algebras and Multiset Rewriting for Immediate Decryption
                  Protocols},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {86--99},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_7},
  doi          = {10.1007/978-3-540-45215-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/BistarelliCLM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/BengtssonGKLLPY02,
  author       = {Johan Bengtsson and
                  W. O. David Griffioen and
                  K{\aa}re J. Kristoffersen and
                  Kim Guldstrand Larsen and
                  Fredrik Larsson and
                  Paul Pettersson and
                  Wang Yi},
  title        = {Automated verification of an audio-control protocol using {UPPAAL}},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {52-53},
  pages        = {163--181},
  year         = {2002},
  url          = {https://doi.org/10.1016/S1567-8326(02)00036-X},
  doi          = {10.1016/S1567-8326(02)00036-X},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/BengtssonGKLLPY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/DaleyS02,
  author       = {Daryl J. Daley and
                  Leslie D. Servi},
  title        = {Loss Probabilities of Hand-in Traffic under Various Protocols, {I:}
                  Models and Algebraic Results},
  journal      = {Telecommun. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {209--226},
  year         = {2002},
  url          = {https://doi.org/10.1023/A:1013346126834},
  doi          = {10.1023/A:1013346126834},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/DaleyS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/GrooteS01,
  author       = {Jan Friso Groote and
                  Jan Springintveld},
  title        = {Focus points and convergent process operators: a proof strategy for
                  protocol verification},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {49},
  number       = {1-2},
  pages        = {31--60},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1567-8326(01)00010-8},
  doi          = {10.1016/S1567-8326(01)00010-8},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/GrooteS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MeyerNP01,
  author       = {Andreas Meyer and
                  Stefan Neis and
                  Thomas Pfahler},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {First Implementation of Cryptographic Protocols Based on Algebraic
                  Number Fields},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {84--103},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_9},
  doi          = {10.1007/3-540-47719-5\_9},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MeyerNP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amast/Cerone00,
  author       = {Antonio Cerone},
  editor       = {Teodor Rus},
  title        = {Process Algebra versus Axiomatic Specification of a Real-Time Protocol},
  booktitle    = {Algebraic Methodology and Software Technology. 8th International Conference,
                  {AMAST} 2000, Iowa City, Iowa, USA, May 20-27, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1816},
  pages        = {57--72},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45499-3\_7},
  doi          = {10.1007/3-540-45499-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/amast/Cerone00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/BorealeNP00,
  author       = {Michele Boreale and
                  Rocco De Nicola and
                  Rosario Pugliese},
  editor       = {Tommaso Bolognesi and
                  Diego Latella},
  title        = {Process Algebraic Analysis of Cryptographic Protocols},
  booktitle    = {Formal Techniques for Distributed System Development, {FORTE/PSTV}
                  2000, {IFIP} {TC6} {WG6.1} Joint International Conference on Formal
                  Description Techniques for Distributed Systems and Communication Protocols
                  {(FORTE} {XIII)} and Protocol Specification, Testing and Verification
                  {(PSTV} XX), October 10-13, 2000, Pisa, Italy},
  series       = {{IFIP} Conference Proceedings},
  volume       = {183},
  pages        = {375--392},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Tue, 19 Feb 2002 10:53:34 +0100},
  biburl       = {https://dblp.org/rec/conf/forte/BorealeNP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/Jmaiel00,
  author       = {Mohamed Jmaiel},
  title        = {A Unified Algebraic Framework for Specifying Communication Protocols},
  booktitle    = {3rd {IEEE} International Conference on Formal Engineering Methods,
                  {ICFEM} 2000, York, England, UK, September 4-7, 2000, Proceedings},
  pages        = {57--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICFEM.2000.873805},
  doi          = {10.1109/ICFEM.2000.873805},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfem/Jmaiel00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifm/Grosse-Rhode99,
  author       = {Martin Gro{\ss}e{-}Rhode},
  editor       = {Keijiro Araki and
                  Andy Galloway and
                  Kenji Taguchi},
  title        = {A Compositional Comparison of Specifications of the Alternating Bit
                  Protocol in {CCS} and {UNITY} Based on Algebra Transformation Systems},
  booktitle    = {Integrated Formal Methods, Proceedings of the 1st International Conference
                  on Integrated Formal Methods, {IFM} 99, York, UK, 28-29 June 1999},
  pages        = {253--272},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-1-4471-0851-1\_14},
  doi          = {10.1007/978-1-4471-0851-1\_14},
  timestamp    = {Fri, 21 Jun 2019 13:08:59 +0200},
  biburl       = {https://dblp.org/rec/conf/ifm/Grosse-Rhode99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:journals/entcs/VlijmenW99a,
  author       = {Sebastiaan van Vlijmen and
                  Jos van Wamel},
  editor       = {Sebastiaan van Vlijmen and
                  Arjan van Waveren and
                  Paul Vriend},
  title        = {A Semantic Approach to Protocold},
  booktitle    = {Algebraic Specification in Action},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {21},
  pages        = {1--32},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1571-0661(05)01187-4},
  doi          = {10.1016/S1571-0661(05)01187-4},
  timestamp    = {Fri, 11 Nov 2022 15:01:32 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/VlijmenW99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/DjemameGMB98,
  author       = {Karim Djemame and
                  Dennis C. Gilles and
                  Lewis M. Mackenzie and
                  Mohamed Bettaz},
  title        = {Performance comparison of high-level algebraic nets distributed simulation
                  protocols},
  journal      = {J. Syst. Archit.},
  volume       = {44},
  number       = {6-7},
  pages        = {457--472},
  year         = {1998},
  url          = {https://doi.org/10.1016/S1383-7621(97)00058-1},
  doi          = {10.1016/S1383-7621(97)00058-1},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/DjemameGMB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmsp/Chen98,
  author       = {Liang Chen},
  editor       = {Mark A. Ardis and
                  Joanne M. Atlee},
  title        = {Verification of an audio control protocol within real time process
                  algebra},
  booktitle    = {Proceedings of the Second Workshop on Formal Methods in Software Practice,
                  March 4-5, 1998, Clearwater Beach, Florida, {USA}},
  pages        = {70--77},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/298595.298860},
  doi          = {10.1145/298595.298860},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fmsp/Chen98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/FredlundGK97,
  author       = {Lars{-}{\AA}ke Fredlund and
                  Jan Friso Groote and
                  Henri Korver},
  title        = {Formal Verification of a Leader Election Protocol in Process Algebra},
  journal      = {Theor. Comput. Sci.},
  volume       = {177},
  number       = {2},
  pages        = {459--486},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0304-3975(96)00256-3},
  doi          = {10.1016/S0304-3975(96)00256-3},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/FredlundGK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hybrid/CeroneCMM97,
  author       = {Antonio Cerone and
                  Alex J. Cowie and
                  George J. Milne and
                  Philip A. Moseley},
  editor       = {Oded Maler},
  title        = {Modelling a Time-Dependent Protocol Using the Circal Process Algebra},
  booktitle    = {Hybrid and Real-Time Systems, International Workshop. HART'97, Grenoble,
                  France, March 26-28, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1201},
  pages        = {124--138},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0014721},
  doi          = {10.1007/BFB0014721},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hybrid/CeroneCMM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Jmaiel96,
  author       = {Mohamed Jmaiel},
  title        = {Development of communication protocols with algebraic temporal specifications},
  school       = {Technical University of Berlin, Germany},
  year         = {1996},
  url          = {https://d-nb.info/946938393},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Jmaiel96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pds/CowlingN96,
  author       = {Anthony J. Cowling and
                  M. C. Nike},
  editor       = {Innes Jelly and
                  Ian Gorton and
                  Peter R. Croll},
  title        = {Using data flow algebra to analyse the alternating bit protocol},
  booktitle    = {Software Engineering for Parallel and Distributed Systems, Proceedings
                  of the First {IFIP} {TC10} International Workshop on Parallel and
                  Distributed Software Engineering, March 1996},
  series       = {{IFIP} Conference Proceedings},
  volume       = {50},
  pages        = {195--207},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Thu, 03 Jan 2002 12:07:19 +0100},
  biburl       = {https://dblp.org/rec/conf/pds/CowlingN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wsc/DjemameBGM96,
  author       = {Karim Djemame and
                  Mohamed Bettaz and
                  Dennis C. Gilles and
                  Lewis M. Mackenzie},
  editor       = {John M. Charnes and
                  Douglas J. Morrice and
                  Daniel T. Brunner and
                  James J. Swain},
  title        = {Performance Comparison of High-Level Algebraic Nets Distributed Simulation
                  Protocols},
  booktitle    = {Proceedings of the 28th conference on Winter simulation, {WSC} 1996,
                  Coronado, CA, USA, December 8-11, 1996},
  pages        = {621--628},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.ieeecomputersociety.org/10.1109/WSC.1996.873343},
  doi          = {10.1109/WSC.1996.873343},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wsc/DjemameBGM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pstv/Jmaiel95,
  author       = {Mohamed Jmaiel},
  editor       = {Piotr Dembinski and
                  Marek Sredniawa},
  title        = {An algebraic-temporal specification of a CSMA/CD-protocol},
  booktitle    = {Protocol Specification, Testing and Verification XV, Proceedings of
                  the Fifteenth {IFIP} {WG6.1} International Symposium on Protocol Specification,
                  Testing and Verification, Warsaw, Poland, June 1995},
  series       = {{IFIP} Conference Proceedings},
  volume       = {38},
  pages        = {187--202},
  publisher    = {Chapman {\&} Hall},
  year         = {1995},
  timestamp    = {Thu, 03 Jan 2002 12:07:46 +0100},
  biburl       = {https://dblp.org/rec/conf/pstv/Jmaiel95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/SistoCV92,
  author       = {Riccardo Sisto and
                  Luigi Ciminiera and
                  Adriano Valenzano},
  title        = {Probabilistic Characterization of Algebraic Protocol Specifications},
  booktitle    = {Proceedings of the 12th International Conference on Distributed Computing
                  Systems, Yokohama, Japan, June 9-12, 1992},
  pages        = {260--268},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/ICDCS.1992.235032},
  doi          = {10.1109/ICDCS.1992.235032},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/SistoCV92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/wsscs/HigashinoTKFM91,
  author       = {Teruo Higashino and
                  Kenichi Taniguchi and
                  Tadao Kasami and
                  Mamoru Fujii and
                  Masaaki Mori},
  editor       = {Ikuo Nakata and
                  Masami Hagiya},
  title        = {An Algebraic Method For Verifying Progress Property of Communication
                  Protocols},
  booktitle    = {Software Science and Engineering: Selected Papers from the Kyoto Symposia},
  series       = {World Scientific Series in Computer Science},
  volume       = {31},
  pages        = {39--59},
  publisher    = {World Scientific},
  year         = {1991},
  url          = {https://doi.org/10.1142/9789814360128\_0003},
  doi          = {10.1142/9789814360128\_0003},
  timestamp    = {Tue, 23 Jun 2020 13:49:03 +0200},
  biburl       = {https://dblp.org/rec/series/wsscs/HigashinoTKFM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adt/Bettaz90,
  author       = {Mohamed Bettaz},
  editor       = {Hartmut Ehrig and
                  Klaus P. Jantke and
                  Fernando Orejas and
                  Horst Reichel},
  title        = {An Association of Algebraic Term Nets and Abstract Data Types for
                  Specifying Real Communication Protocols},
  booktitle    = {Recent Trends in Data Type Specification, Proceedings 7th Workshop
                  on Abstract Data Types, Wusterhausen, Dosse, Germany, April 17-20,
                  1990},
  series       = {Lecture Notes in Computer Science},
  volume       = {534},
  pages        = {11--30},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-54496-8\_2},
  doi          = {10.1007/3-540-54496-8\_2},
  timestamp    = {Sun, 06 Oct 2024 20:55:43 +0200},
  biburl       = {https://dblp.org/rec/conf/adt/Bettaz90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iee/LombardoP89,
  author       = {Alfio Lombardo and
                  Sergio Palazzo},
  title        = {An extended algebra for the validation of communication protocols},
  journal      = {Softw. Eng. J.},
  volume       = {4},
  number       = {3},
  pages        = {148--158},
  year         = {1989},
  url          = {https://doi.org/10.1049/sej.1989.0018},
  doi          = {10.1049/SEJ.1989.0018},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iee/LombardoP89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/HigashinoFTKM89,
  author       = {Teruo Higashino and
                  Mamoru Fujii and
                  Kenichi Taniguchi and
                  Tadao Kasami and
                  Masaaki Mori},
  title        = {Verification of safeness and mutual exclusion properties of algebraically
                  specified token ring {LAN} protocol},
  journal      = {Syst. Comput. Jpn.},
  volume       = {20},
  number       = {5},
  pages        = {57--68},
  year         = {1989},
  url          = {https://doi.org/10.1002/scj.4690200506},
  doi          = {10.1002/SCJ.4690200506},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/HigashinoFTKM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/LeeL88,
  author       = {Tony T. Lee and
                  Ming{-}Yee Lai},
  title        = {A Relational Algebraic Approach to Protocol Verification},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {14},
  number       = {2},
  pages        = {184--193},
  year         = {1988},
  url          = {https://doi.org/10.1109/32.4637},
  doi          = {10.1109/32.4637},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/LeeL88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/es/Soriano87,
  author       = {Orlando Pereda},
  title        = {Validaci{\'{o}}n de protocolos, una aproximaci{\'{o}}n algebraica},
  school       = {Technical University of Madrid, Spain},
  year         = {1987},
  url          = {https://oa.upm.es/10327/},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/es/Soriano87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/HigashinoTKFM87,
  author       = {Teruo Higashino and
                  Kenichi Taniguchi and
                  Tadao Kasami and
                  Mamoru Fujii and
                  Masaaki Mori},
  title        = {Verification of progress property of algebraically specified communication
                  protocols},
  journal      = {Syst. Comput. Jpn.},
  volume       = {18},
  number       = {9},
  pages        = {96--107},
  year         = {1987},
  url          = {https://doi.org/10.1002/scj.4690180910},
  doi          = {10.1002/SCJ.4690180910},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/HigashinoTKFM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/Kooken85,
  author       = {C. J. Kooken},
  title        = {Algebraic Specification and Verification of Communicating Protocols},
  journal      = {Sci. Comput. Program.},
  volume       = {5},
  number       = {1},
  pages        = {1--36},
  year         = {1985},
  url          = {https://doi.org/10.1016/0167-6423(85)90002-4},
  doi          = {10.1016/0167-6423(85)90002-4},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/Kooken85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BookO85a,
  author       = {Ronald V. Book and
                  Friedrich Otto},
  title        = {On the Verifiability of Two-Party Algebraic Protocols},
  journal      = {Theor. Comput. Sci.},
  volume       = {40},
  pages        = {101--130},
  year         = {1985},
  url          = {https://doi.org/10.1016/0304-3975(85)90161-6},
  doi          = {10.1016/0304-3975(85)90161-6},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BookO85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aii/BergstraK85,
  author       = {Jan A. Bergstra and
                  Jan Willem Klop},
  editor       = {Wolfgang Bibel and
                  Klaus P. Jantke},
  title        = {Verification of an alternating bit protocol by means of process algebra},
  booktitle    = {Mathematical Methods of Specification and Synthesis of Software Systems
                  '85, Proceedings of the International Spring School, Wendisch-Rietz,
                  GDR, April 22-26, 1985},
  series       = {Lecture Notes in Computer Science},
  volume       = {215},
  pages        = {9--23},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-16444-8\_1},
  doi          = {10.1007/3-540-16444-8\_1},
  timestamp    = {Sun, 06 Oct 2024 20:55:55 +0200},
  biburl       = {https://dblp.org/rec/conf/aii/BergstraK85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pstv/StefanoMM85,
  author       = {Antonella Di Stefano and
                  Michele Malgeri and
                  Orazio Mirabella},
  editor       = {Michel Diaz},
  title        = {A specification of a {PROWAY} protocol with an Algebraic language},
  booktitle    = {Protocol Specification, Testing and Verification V, Proceedings of
                  the {IFIP} {WG6.1} Fifth International Conference on Protocol Specification,
                  Testing and Verification, Toulouse-Moissac, France, June 10-13, 1985},
  pages        = {195--213},
  publisher    = {North-Holland},
  year         = {1985},
  timestamp    = {Mon, 07 Jan 2002 16:07:03 +0100},
  biburl       = {https://dblp.org/rec/conf/pstv/StefanoMM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pstv/NounouY84,
  author       = {Nihal Nounou and
                  Yechiam Yemini},
  editor       = {Yechiam Yemini and
                  Robert E. Strom and
                  Shaula Yemini},
  title        = {Algebraic Specification-Based Performance Analysis of Communication
                  Protocols},
  booktitle    = {Protocol Specification, Testing and Verification IV, Proceedings of
                  the {IFIP} {WG6.1} Fourth International Workshop on Protocol Specification,
                  Testing and Verification, Skytop Lodge, PA, USA, June 11-14, 1984},
  pages        = {541--560},
  publisher    = {North-Holland},
  year         = {1984},
  timestamp    = {Tue, 25 Feb 2003 15:13:25 +0100},
  biburl       = {https://dblp.org/rec/conf/pstv/NounouY84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}