default search action
Search dblp for Publications
export results for "Protocol Algebra."
@article{DBLP:journals/iandc/JacksonP25, author = {J. Jackson and R. Perumal}, title = {An algebraic attack on the key exchange protocol based upon a modified tropical structure}, journal = {Inf. Comput.}, volume = {303}, pages = {105259}, year = {2025}, url = {https://doi.org/10.1016/j.ic.2024.105259}, doi = {10.1016/J.IC.2024.105259}, timestamp = {Sun, 22 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/JacksonP25.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/NguyenBBNN24, author = {Anh{-}Tu Nguyen and Thanh{-}Lam Bui and Huy Anh Bui and Sy{-}Tai Nguyen and Xuan{-}Thuan Nguyen}, title = {Application of hedge algebras algorithm for mobile robot controller via hand gestures and wireless protocol}, journal = {J. Intell. Fuzzy Syst.}, volume = {46}, number = {1}, pages = {1201--1212}, year = {2024}, url = {https://doi.org/10.3233/jifs-232116}, doi = {10.3233/JIFS-232116}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/NguyenBBNN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlap/NesterV24, author = {Chad Nester and Niels F. W. Voorneveld}, title = {Protocol choice and iteration for the free cornering}, journal = {J. Log. Algebraic Methods Program.}, volume = {137}, pages = {100942}, year = {2024}, url = {https://doi.org/10.1016/j.jlamp.2023.100942}, doi = {10.1016/J.JLAMP.2023.100942}, timestamp = {Sat, 17 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlap/NesterV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlhussainiCS24, author = {Sulaiman Alhussaini and Craig Collett and Sergei Sergeev}, title = {On the tropical two-sided discrete logarithm and a key exchange protocol based on the tropical algebra of pairs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2024}, url = {https://eprint.iacr.org/2024/010}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlhussainiCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/KumarK23, author = {N. Suresh Kumar and G. Santhosh Kumar}, title = {Abstracting IoT protocols using timed process algebra and {SPIN} model checker}, journal = {Clust. Comput.}, volume = {26}, number = {2}, pages = {1611--1629}, year = {2023}, url = {https://doi.org/10.1007/s10586-022-03963-y}, doi = {10.1007/S10586-022-03963-Y}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/KumarK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlap/FredlundEAS23, author = {Lars{-}{\AA}ke Fredlund and Clara Benac Earle and Thomas Arts and Hans Svensson}, title = {Gaining trust by tracing security protocols}, journal = {J. Log. Algebraic Methods Program.}, volume = {130}, pages = {100829}, year = {2023}, url = {https://doi.org/10.1016/j.jlamp.2022.100829}, doi = {10.1016/J.JLAMP.2022.100829}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlap/FredlundEAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlap/LopezRuedaES23, author = {Ra{\'{u}}l L{\'{o}}pez{-}Rueda and Santiago Escobar and Julia Sapi{\~{n}}a}, title = {An efficient canonical narrowing implementation with irreducibility and {SMT} constraints for generic symbolic protocol analysis}, journal = {J. Log. Algebraic Methods Program.}, volume = {135}, pages = {100895}, year = {2023}, url = {https://doi.org/10.1016/j.jlamp.2023.100895}, doi = {10.1016/J.JLAMP.2023.100895}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlap/LopezRuedaES23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlap/SavanovicG23, author = {Zorica Savanovic and Letterio Galletta}, title = {A type language for distributed reactive components governed by communication protocols}, journal = {J. Log. Algebraic Methods Program.}, volume = {132}, pages = {100848}, year = {2023}, url = {https://doi.org/10.1016/j.jlamp.2023.100848}, doi = {10.1016/J.JLAMP.2023.100848}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlap/SavanovicG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/MordidoS0V23, author = {Andreia Mordido and Janek Spaderna and Peter Thiemann and Vasco T. Vasconcelos}, title = {Parameterized Algebraic Protocols}, journal = {Proc. {ACM} Program. Lang.}, volume = {7}, number = {{PLDI}}, pages = {1389--1413}, year = {2023}, url = {https://doi.org/10.1145/3591277}, doi = {10.1145/3591277}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/MordidoS0V23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-03764, author = {Andreia Mordido and Janek Spaderna and Peter Thiemann and Vasco T. Vasconcelos}, title = {Parameterized Algebraic Protocols}, journal = {CoRR}, volume = {abs/2304.03764}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.03764}, doi = {10.48550/ARXIV.2304.03764}, eprinttype = {arXiv}, eprint = {2304.03764}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-03764.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Cheikhrouhou22, author = {Lassaad Cheikhrouhou}, title = {Inductive verification of cryptographic protocols based on message algebras - trace and indistinguishability properties}, school = {Saarland University, Saarbr{\"{u}}cken, Germany}, year = {2022}, url = {https://publikationen.sulb.uni-saarland.de/handle/20.500.11880/33464}, urn = {urn:nbn:de:bsz:291--ds-365586}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Cheikhrouhou22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Bordage22, author = {Sarah Bordage}, title = {Efficient protocols for testing proximity to algebraic codes. (Protocoles efficaces pour tester la proximit{\'{e}} {\`{a}} des codes alg{\'{e}}briques)}, school = {Polytechnic Institute of Paris, Palaiseau, France}, year = {2022}, url = {https://tel.archives-ouvertes.fr/tel-03744182}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Bordage22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlap/BavendiekS22, author = {Kai Bavendiek and Sibylle Schupp}, title = {A process calculus for privacy-preserving protocols in location-based service systems}, journal = {J. Log. Algebraic Methods Program.}, volume = {125}, pages = {100735}, year = {2022}, url = {https://doi.org/10.1016/j.jlamp.2021.100735}, doi = {10.1016/J.JLAMP.2021.100735}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlap/BavendiekS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlap/KozenS22, author = {Dexter Kozen and Matvey Soloviev}, title = {Coalgebraic tools for randomness-conserving protocols}, journal = {J. Log. Algebraic Methods Program.}, volume = {125}, pages = {100734}, year = {2022}, url = {https://doi.org/10.1016/j.jlamp.2021.100734}, doi = {10.1016/J.JLAMP.2021.100734}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlap/KozenS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AnagrehL22, author = {Mohammad Anagreh and Peeter Laud}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Guillermo Navarro{-}Arribas and Nicola Dragoni}, title = {A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra Problem}, booktitle = {Data Privacy Management, Cryptocurrencies and Blockchain Technology - {ESORICS} 2022 International Workshops, {DPM} 2022 and {CBT} 2022, Copenhagen, Denmark, September 26-30, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13619}, pages = {120--135}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25734-6\_8}, doi = {10.1007/978-3-031-25734-6\_8}, timestamp = {Tue, 28 Feb 2023 08:10:09 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AnagrehL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/XiaoNFS22, author = {Junhui Xiao and Ashish Neupane and Hiba F. Fayoumi and Weiqing Sun}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem}, booktitle = {Proceedings of the 8th International Conference on Information Systems Security and Privacy, {ICISSP} 2022, Online Streaming, February 9-11, 2022}, pages = {396--403}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0010843300003120}, doi = {10.5220/0010843300003120}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/icissp/XiaoNFS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intelitsis/LetychevskyiPH22, author = {Oleksandr A. Letychevskyi and Volodymyr Peschanenko and Serhii Horbatiuk}, editor = {Tetiana Hovorushchenko and Oleg Savenko and Peter T. Popov and Sergii Lysenko}, title = {Consensus protocol security analysis using an algebraic virtual machine}, booktitle = {Proceedings of the 3rd International Workshop on Intelligent Information Technologies {\&} Systems of Information Security, Khmelnytskyi, Ukraine, March 23-25, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3156}, pages = {484--493}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3156/paper37.pdf}, timestamp = {Fri, 02 Jun 2023 17:09:30 +0200}, biburl = {https://dblp.org/rec/conf/intelitsis/LetychevskyiPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-07964, author = {Mohammad Anagreh and Peeter Laud}, title = {A Parallel Privacy-Preserving Shortest Path Protocol from a Path Algebra Problem}, journal = {CoRR}, volume = {abs/2207.07964}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.07964}, doi = {10.48550/ARXIV.2207.07964}, eprinttype = {arXiv}, eprint = {2207.07964}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-07964.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-09852, author = {Giorgio Sonnino and Alberto Sonnino}, title = {Efficient Multiparty Protocols Using Generalized Parseval's Identity and the Theta Algebra}, journal = {CoRR}, volume = {abs/2208.09852}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.09852}, doi = {10.48550/ARXIV.2208.09852}, eprinttype = {arXiv}, eprint = {2208.09852}, timestamp = {Mon, 29 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-09852.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KotovTB22, author = {Matvei Kotov and Alexander Treier and Ivan Buchinskiy}, title = {An attack on a key exchange protocol based on max-times and min-times algebras}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1644}, year = {2022}, url = {https://eprint.iacr.org/2022/1644}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KotovTB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/Lipinski21, author = {Zbigniew Lipinski}, title = {Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {32}, number = {1}, pages = {81--96}, year = {2021}, url = {https://doi.org/10.1007/s00200-019-00402-1}, doi = {10.1007/S00200-019-00402-1}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/Lipinski21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/Aziz21, author = {Benjamin Aziz}, title = {A process algebraic mutation framework with application to a vehicle charging protocol}, journal = {Veh. Commun.}, volume = {30}, pages = {100352}, year = {2021}, url = {https://doi.org/10.1016/j.vehcom.2021.100352}, doi = {10.1016/J.VEHCOM.2021.100352}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vcomm/Aziz21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwbis/AlmalikS21, author = {Muhammad Ziyad Almalik and Sepha Siswantyo}, title = {Modified Dass-Om Protocol for Preventing Algebraic Replay Attacks}, booktitle = {6th International Workshop on Big Data and Information Security, {IWBIS} 2021, Depok, Indonesia, October 23-25, 2021}, pages = {103--108}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IWBIS53353.2021.9631843}, doi = {10.1109/IWBIS53353.2021.9631843}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwbis/AlmalikS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-05238, author = {A. S. Sitdikov and A. S. Nikitin}, title = {Quantum protocols at presence of non-abelian superselection rules in the framework of algebraic model}, journal = {CoRR}, volume = {abs/2104.05238}, year = {2021}, url = {https://arxiv.org/abs/2104.05238}, eprinttype = {arXiv}, eprint = {2104.05238}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-05238.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Lucas20, author = {David Lucas}, title = {Secure and efficient outsourced computation protocols for linear algebra. (Protocoles de calculs externalis{\'{e}}s efficaces et s{\'{e}}curis{\'{e}}s pour l'alg{\`{e}}bre lin{\'{e}}aire)}, school = {Grenoble Alpes University, France}, year = {2020}, url = {https://tel.archives-ouvertes.fr/tel-03012730}, timestamp = {Tue, 12 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/hal/Lucas20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iwc/FloresGA20, author = {Silvia Berenice Fajardo Flores and Jorge Rafael Gutierrez{-}Pulido and Mar{\'{\i}}a Andrade{-}Ar{\'{e}}chiga}, title = {Keyboard-Based Protocol for Typing Algebraic Expressions}, journal = {Interact. Comput.}, volume = {32}, number = {1}, pages = {52--65}, year = {2020}, url = {https://doi.org/10.1093/iwcomp/iwaa004}, doi = {10.1093/IWCOMP/IWAA004}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iwc/FloresGA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Daggitt19, author = {Matthew L. Daggitt}, title = {An algebraic perspective on the convergence of vector-based routing protocols}, school = {University of Cambridge, {UK}}, year = {2019}, url = {https://doi.org/10.17863/CAM.39222}, doi = {10.17863/CAM.39222}, timestamp = {Mon, 22 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Daggitt19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlap/AlrahmanV19, author = {Yehia Abd Alrahman and Hugo Torres Vieira}, title = {A coordination protocol language for power grid operation control}, journal = {J. Log. Algebraic Methods Program.}, volume = {109}, year = {2019}, url = {https://doi.org/10.1016/j.jlamp.2019.100487}, doi = {10.1016/J.JLAMP.2019.100487}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlap/AlrahmanV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/WangKMS19, author = {Rui Wang and Lars Michael Kristensen and Hein Meling and Volker Stolz}, title = {Automated test case generation for the Paxos single-decree protocol using a Coloured Petri Net model}, journal = {J. Log. Algebraic Methods Program.}, volume = {104}, pages = {254--273}, year = {2019}, url = {https://doi.org/10.1016/j.jlamp.2019.02.004}, doi = {10.1016/J.JLAMP.2019.02.004}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/WangKMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/GlabbeekHM19, author = {Rob van Glabbeek and Peter H{\"{o}}fner and Michael Markl}, editor = {Lu{\'{\i}}s Caires}, title = {A Process Algebra for Link Layer Protocols}, booktitle = {Programming Languages and Systems - 28th European Symposium on Programming, {ESOP} 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2019, Prague, Czech Republic, April 6-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11423}, pages = {668--693}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17184-1\_24}, doi = {10.1007/978-3-030-17184-1\_24}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esop/GlabbeekHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-13329, author = {Rob van Glabbeek and Peter H{\"{o}}fner and Michael Markl}, title = {A Process Algebra for Link Layer Protocols}, journal = {CoRR}, volume = {abs/1907.13329}, year = {2019}, url = {http://arxiv.org/abs/1907.13329}, eprinttype = {arXiv}, eprint = {1907.13329}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-13329.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/Zhang18, author = {Yang Zhang}, title = {Cryptanalysis of a key exchange protocol based on the ring E\({}_{\mbox{p}}\)\({}^{\mbox{(m)}}\)}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {29}, number = {2}, pages = {103--112}, year = {2018}, url = {https://doi.org/10.1007/s00200-017-0332-0}, doi = {10.1007/S00200-017-0332-0}, timestamp = {Fri, 02 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aaecc/Zhang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Padovani18, author = {Luca Padovani}, title = {A type checking algorithm for concurrent object protocols}, journal = {J. Log. Algebraic Methods Program.}, volume = {100}, pages = {16--35}, year = {2018}, url = {https://doi.org/10.1016/j.jlamp.2018.06.001}, doi = {10.1016/J.JLAMP.2018.06.001}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Padovani18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KotovU18, author = {Matvei Kotov and Alexander Ushakov}, title = {Analysis of a key exchange protocol based on tropical matrix algebra}, journal = {J. Math. Cryptol.}, volume = {12}, number = {3}, pages = {137--141}, year = {2018}, url = {https://doi.org/10.1515/jmc-2016-0064}, doi = {10.1515/JMC-2016-0064}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KotovU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/RoigAGJ18, author = {Pedro Juan Roig and Salvador Alcaraz and Katja Gilly and Carlos Juiz}, editor = {Christian Callegari and Marten van Sinderen and Paulo Novais and Panagiotis G. Sarigiannidis and Sebastiano Battiato and {\'{A}}ngel Serrano S{\'{a}}nchez de Le{\'{o}}n and Pascal Lorenz and Mohammad S. Obaidat}, title = {{OSPF} Algebraic Formal Modelling using {ACP} - {A} Formal Description on {OSPF} Routing Protocol}, booktitle = {Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, {ICETE} 2018 - Volume 1: DCNET, ICE-B, OPTICS, {SIGMAP} and WINSYS, Porto, Portugal, July 26-28, 2018}, pages = {221--232}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006838702210232}, doi = {10.5220/0006838702210232}, timestamp = {Wed, 29 Aug 2018 15:17:08 +0200}, biburl = {https://dblp.org/rec/conf/icete/RoigAGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/simultech/RoigAGJ18, author = {Pedro Juan Roig and Salvador Alcaraz and Katja Gilly and Carlos Juiz}, editor = {Floriano De Rango and Tuncer I. {\"{O}}ren and Mohammad S. Obaidat}, title = {Algebraic Formal Modelling for {EIGRP} using {ACP} - Formal Description Modelling on {EIGRP} Routing Protocol}, booktitle = {Proceedings of 8th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, {SIMULTECH} 2018, Porto, Portugal, July 29-31, 2018}, pages = {259--266}, publisher = {SciTePress}, year = {2018}, url = {https://doi.org/10.5220/0006838802590266}, doi = {10.5220/0006838802590266}, timestamp = {Wed, 29 Aug 2018 15:28:43 +0200}, biburl = {https://dblp.org/rec/conf/simultech/RoigAGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/AmariucaiBG18, author = {George T. Amariucai and Sanchita Barman and Yong Guan}, editor = {Panos Papadimitratos and Kevin R. B. Butler and Christina P{\"{o}}pper}, title = {An Algebraic Quality-Time-Advantage-Based Key Establishment Protocol}, booktitle = {Proceedings of the 11th {ACM} Conference on Security {\&} Privacy in Wireless and Mobile Networks, WiSec 2018, Stockholm, Sweden, June 18-20, 2018}, pages = {144--153}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3212480.3212507}, doi = {10.1145/3212480.3212507}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/AmariucaiBG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoumanV18, author = {Niek J. Bouman and Niels de Vreede}, title = {New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2018}, url = {https://eprint.iacr.org/2018/703}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoumanV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/DelauneH17, author = {St{\'{e}}phanie Delaune and Lucca Hirschi}, title = {A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols}, journal = {J. Log. Algebraic Methods Program.}, volume = {87}, pages = {127--144}, year = {2017}, url = {https://doi.org/10.1016/j.jlamp.2016.10.005}, doi = {10.1016/J.JLAMP.2016.10.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/DelauneH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/LiuZFXLX17, author = {Ailun Liu and Huibiao Zhu and Yuan Fei and Shuangqing Xiang and Gang Lu and Wanling Xie}, editor = {Sorel Reisman and Sheikh Iqbal Ahamed and Claudio Demartini and Thomas M. Conte and Ling Liu and William R. Claycomb and Motonori Nakamura and Edmundo Tovar and Stelvio Cimato and Chung{-}Horng Lung and Hiroki Takakura and Ji{-}Jiang Yang and Toyokazu Akiyama and Zhiyong Zhang and Md. Kamrul Hasan}, title = {Modeling and Analysis of the Security Protocol in {C-DAX} Based on Process Algebra}, booktitle = {41st {IEEE} Annual Computer Software and Applications Conference, {COMPSAC} 2017, Turin, Italy, July 4-8, 2017. Volume 1}, pages = {39--44}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/COMPSAC.2017.170}, doi = {10.1109/COMPSAC.2017.170}, timestamp = {Mon, 25 Nov 2024 07:52:55 +0100}, biburl = {https://dblp.org/rec/conf/compsac/LiuZFXLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/SheZZ17, author = {Jia She and Xiaoran Zhu and Min Zhang}, editor = {Xudong He}, title = {Algebraic Formalization and Verification of PKMv3 Protocol using Maude}, booktitle = {The 29th International Conference on Software Engineering and Knowledge Engineering, Wyndham Pittsburgh University Center, Pittsburgh, PA, USA, July 5-7, 2017}, pages = {167--172}, publisher = {{KSI} Research Inc. and Knowledge Systems Institute Graduate School}, year = {2017}, url = {https://doi.org/10.18293/SEKE2017-061}, doi = {10.18293/SEKE2017-061}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seke/SheZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/BourkeGH16, author = {Timothy Bourke and Rob J. van Glabbeek and Peter H{\"{o}}fner}, title = {Mechanizing a Process Algebra for Network Protocols}, journal = {J. Autom. Reason.}, volume = {56}, number = {3}, pages = {309--341}, year = {2016}, url = {https://doi.org/10.1007/s10817-015-9358-9}, doi = {10.1007/S10817-015-9358-9}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/BourkeGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Nepeivoda16, author = {Antonina Nepeivoda}, title = {Ping-pong protocols as prefix grammars: Modelling and verification via program transformation}, journal = {J. Log. Algebraic Methods Program.}, volume = {85}, number = {5}, pages = {782--804}, year = {2016}, url = {https://doi.org/10.1016/j.jlamp.2016.06.001}, doi = {10.1016/J.JLAMP.2016.06.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Nepeivoda16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BlackburnR16, author = {Simon R. Blackburn and Matthew J. B. Robshaw}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {On the Security of the Algebraic Eraser Tag Authentication Protocol}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {3--17}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_1}, doi = {10.1007/978-3-319-39555-5\_1}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/BlackburnR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcom/FuB16, author = {Chen Fu and Fu Bing}, editor = {Meikang Qiu}, title = {{SDN} Protocol Analysis with Process Algebra Method}, booktitle = {Smart Computing and Communication - First International Conference, SmartCom 2016, Shenzhen, China, December 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10135}, pages = {95--101}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-52015-5\_10}, doi = {10.1007/978-3-319-52015-5\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/smartcom/FuB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlackburnR16, author = {Simon R. Blackburn and Matthew J. B. Robshaw}, title = {On the security of the Algebraic Eraser tag authentication protocol}, journal = {CoRR}, volume = {abs/1602.00860}, year = {2016}, url = {http://arxiv.org/abs/1602.00860}, eprinttype = {arXiv}, eprint = {1602.00860}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlackburnR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtkinsG16, author = {Derek Atkins and Dorian Goldfeld}, title = {Addressing the Algebraic Eraser Diffie-Hellman Over-the-Air Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {205}, year = {2016}, url = {http://eprint.iacr.org/2016/205}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtkinsG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnR16, author = {Simon R. Blackburn and Matthew J. B. Robshaw}, title = {On the Security of the Algebraic Eraser Tag Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2016}, url = {http://eprint.iacr.org/2016/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GonzalezMT16, title = {Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {737}, year = {2016}, note = {Withdrawn.}, url = {http://eprint.iacr.org/2016/737}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GonzalezMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/EkbergGS015, author = {Pontus Ekberg and Nan Guan and Martin Stigge and Wang Yi}, title = {An optimal resource sharing protocol for generalized multiframe tasks}, journal = {J. Log. Algebraic Methods Program.}, volume = {84}, number = {1}, pages = {92--105}, year = {2015}, url = {https://doi.org/10.1016/j.jlamp.2014.10.001}, doi = {10.1016/J.JLAMP.2014.10.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/EkbergGS015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AsgharSLKP15, author = {Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali K{\^{a}}afar and Josef Pieprzyk}, title = {On the Linearization of Human Identification Protocols: Attacks Based on Linear Algebra, Coding Theory, and Lattices}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {8}, pages = {1643--1655}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2421875}, doi = {10.1109/TIFS.2015.2421875}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AsgharSLKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/LafourcadeP15, author = {Pascal Lafourcade and Maxime Puys}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Evangelos Kranakis and Guillaume Bonfante}, title = {Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties}, booktitle = {Foundations and Practice of Security - 8th International Symposium, {FPS} 2015, Clermont-Ferrand, France, October 26-28, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9482}, pages = {137--155}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30303-1\_9}, doi = {10.1007/978-3-319-30303-1\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/LafourcadeP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BourkeGH15a, author = {Timothy Bourke and Rob J. van Glabbeek and Peter H{\"{o}}fner}, title = {Mechanizing a Process Algebra for Network Protocols}, journal = {CoRR}, volume = {abs/1512.07304}, year = {2015}, url = {http://arxiv.org/abs/1512.07304}, eprinttype = {arXiv}, eprint = {1512.07304}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BourkeGH15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KotovU15, author = {Matvei Kotov and Alexander Ushakov}, title = {Analysis of a key exchange protocol based on tropical matrix algebra}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {852}, year = {2015}, url = {http://eprint.iacr.org/2015/852}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KotovU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KreuzerMU14, author = {Martin Kreuzer and Alexey D. Myasnikov and Alexander Ushakov}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {A Linear Algebra Attack to Group-Ring-Based Key Exchange Protocols}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {37--43}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_3}, doi = {10.1007/978-3-319-07536-5\_3}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/KreuzerMU14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apn/PuraB14, author = {Mihai{-}Lica Pura and Didier Buchs}, editor = {Daniel Moldt and Heiko R{\"{o}}lke}, title = {Using Symbolic Techniques and Algebraic Petri Nets to Model Check Security Protocols for Ad Hoc Networks}, booktitle = {Proceedings of the International Workshop on Petri Nets and Software Engineering, co-located with 35th International Conference on Application and Theory of Petri Nets and Concurrency (PetriNets 2014) and 14th International Conference on Application of Concurrency to System Design {(ACSD} 2014), Tunis, Tunisia, June 23-24, 2014}, series = {{CEUR} Workshop Proceedings}, volume = {1160}, pages = {91--110}, publisher = {CEUR-WS.org}, year = {2014}, url = {https://ceur-ws.org/Vol-1160/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:39 +0100}, biburl = {https://dblp.org/rec/conf/apn/PuraB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/RochaM14, author = {Camilo Rocha and Jos{\'{e}} Meseguer}, editor = {Shusaku Iida and Jos{\'{e}} Meseguer and Kazuhiro Ogata}, title = {Mechanical Analysis of Reliable Communication in the Alternating Bit Protocol Using the Maude Invariant Analyzer Tool}, booktitle = {Specification, Algebra, and Software - Essays Dedicated to Kokichi Futatsugi}, series = {Lecture Notes in Computer Science}, volume = {8373}, pages = {603--629}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54624-2\_30}, doi = {10.1007/978-3-642-54624-2\_30}, timestamp = {Thu, 21 Sep 2023 09:08:34 +0200}, biburl = {https://dblp.org/rec/conf/birthday/RochaM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/depcos/FrolovV14, author = {Alexander Frolov and Alexander Vinnikov}, editor = {Wojciech Zamojski and Jacek Mazurkiewicz and Jaroslaw Sugier and Tomasz Walkowiak and Janusz Kacprzyk}, title = {{FSM} Simulation of Cryptographic Protocols Using Algebraic Processor}, booktitle = {Proceedings of the Ninth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX. June 30 - July 4, 2014, Brun{\'{o}}w, Poland}, series = {Advances in Intelligent Systems and Computing}, volume = {286}, pages = {189--198}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07013-1\_18}, doi = {10.1007/978-3-319-07013-1\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/depcos/FrolovV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccomm/PuraB14, author = {Mihai{-}Lica Pura and Didier Buchs}, title = {Model checking {ARAN} ad hoc secure routing protocol with algebraic Petri nets}, booktitle = {10th International Conference on Communications, {COMM} 2014, Bucharest, Romania, May 29-31, 2014}, pages = {1--4}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICComm.2014.6866692}, doi = {10.1109/ICCOMM.2014.6866692}, timestamp = {Fri, 01 Apr 2022 12:37:24 +0200}, biburl = {https://dblp.org/rec/conf/iccomm/PuraB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/PuraB14, author = {Mihai{-}Lica Pura and Didier Buchs}, title = {Using Algebraic Petri Nets for Testing the Models of Ad Hoc Secure Routing Protocols in Mobility Scenarios}, booktitle = {Seventh {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2014 Workshops Proceedings, March 31 - April 4, 2014, Cleveland, Ohio, {USA}}, pages = {2--3}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICSTW.2014.64}, doi = {10.1109/ICSTW.2014.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/PuraB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/YuNRWCX14, author = {Yong Yu and Jianbing Ni and Jian Ren and Wei Wu and Lanxiang Chen and Qi Xia}, editor = {Xinyi Huang and Jianying Zhou}, title = {Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {359--372}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_27}, doi = {10.1007/978-3-319-06320-1\_27}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/ispec/YuNRWCX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itp/BourkeGH14, author = {Timothy Bourke and Rob J. van Glabbeek and Peter H{\"{o}}fner}, editor = {Gerwin Klein and Ruben Gamboa}, title = {Showing Invariance Compositionally for a Process Algebra for Network Protocols}, booktitle = {Interactive Theorem Proving - 5th International Conference, {ITP} 2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna, Austria, July 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8558}, pages = {144--159}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08970-6\_10}, doi = {10.1007/978-3-319-08970-6\_10}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/itp/BourkeGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BarrealHKL14, author = {Amaro Barreal and Camilla Hollanti and David A. Karpuk and Hsiao{-}feng Lu}, title = {Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems}, journal = {CoRR}, volume = {abs/1405.4375}, year = {2014}, url = {http://arxiv.org/abs/1405.4375}, eprinttype = {arXiv}, eprint = {1405.4375}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BarrealHKL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BourkeGH14, author = {Timothy Bourke and Rob J. van Glabbeek and Peter H{\"{o}}fner}, title = {Showing invariance compositionally for a process algebra for network protocols}, journal = {CoRR}, volume = {abs/1407.3519}, year = {2014}, url = {http://arxiv.org/abs/1407.3519}, eprinttype = {arXiv}, eprint = {1407.3519}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BourkeGH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AsgharSLKP14, author = {Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Dali Kaafar and Josef Pieprzyk}, title = {Algebraic Attacks on Human Identification Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {767}, year = {2014}, url = {http://eprint.iacr.org/2014/767}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AsgharSLKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsis/WuZZWL13, author = {Xi Wu and Huibiao Zhu and Yongxin Zhao and Zheng Wang and Si Liu}, title = {Modeling and verifying the Ariadne protocol using process algebra}, journal = {Comput. Sci. Inf. Syst.}, volume = {10}, number = {1}, pages = {393--421}, year = {2013}, url = {https://doi.org/10.2298/CSIS120601009W}, doi = {10.2298/CSIS120601009W}, timestamp = {Fri, 16 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsis/WuZZWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secnet/ChikoucheFB13, author = {Noureddine Chikouche and Cherif Foudil and Mohamed Benmohammed}, editor = {Ali Ismail Awad and Aboul Ella Hassanien and Kensuke Baba}, title = {Algebraic Replay Attacks on Authentication in {RFID} Protocols}, booktitle = {Advances in Security of Information and Communication Networks - First International Conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013. Proceedings}, series = {Communications in Computer and Information Science}, volume = {381}, pages = {153--163}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40597-6\_13}, doi = {10.1007/978-3-642-40597-6\_13}, timestamp = {Wed, 19 May 2021 08:32:23 +0200}, biburl = {https://dblp.org/rec/conf/secnet/ChikoucheFB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sera/OuranosS13, author = {Iakovos Ouranos and Petros S. Stefaneas}, editor = {Roger Y. Lee}, title = {Towards a Protocol Algebra Based on Algebraic Specifications}, booktitle = {Software Engineering Research, Management and Applications [selected papers from the 11th International Conference on Software Engineering Research, Management and Applications, {SERA} 2013, Prague, Czech Republic, August 7-9, 2013]}, series = {Studies in Computational Intelligence}, volume = {496}, pages = {85--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-00948-3\_6}, doi = {10.1007/978-3-319-00948-3\_6}, timestamp = {Fri, 19 May 2017 01:26:31 +0200}, biburl = {https://dblp.org/rec/conf/sera/OuranosS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/KamalY12, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Cryptanalysis of a key exchange protocol based on the endomorphisms ring End ({\(\mathbb{Z}\)}\({}_{\mbox{p}}\) {\texttimes} {\(\mathbb{Z}\)}\({}_{\mbox{p\({}^{\mbox{2}}\)}}\))}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {23}, number = {3-4}, pages = {143--149}, year = {2012}, url = {https://doi.org/10.1007/s00200-012-0170-z}, doi = {10.1007/S00200-012-0170-Z}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/KamalY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/KazemeyniJOB12, author = {Fatemeh Kazemeyni and Einar Broch Johnsen and Olaf Owe and Ilangko Balasingham}, title = {Formal modeling and validation of a power-efficient grouping protocol for WSNs}, journal = {J. Log. Algebraic Methods Program.}, volume = {81}, number = {3}, pages = {284--297}, year = {2012}, url = {https://doi.org/10.1016/j.jlap.2011.12.001}, doi = {10.1016/J.JLAP.2011.12.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/KazemeyniJOB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/MateescuPS12, author = {Radu Mateescu and Pascal Poizat and Gwen Sala{\"{u}}n}, title = {Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques}, journal = {{IEEE} Trans. Software Eng.}, volume = {38}, number = {4}, pages = {755--777}, year = {2012}, url = {https://doi.org/10.1109/TSE.2011.62}, doi = {10.1109/TSE.2011.62}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tse/MateescuPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccis/TianW12a, author = {Xiaoming Tian and Qiuxin Wu}, title = {An approach to improve process algebra based protocol composition model}, booktitle = {2nd {IEEE} International Conference on Cloud Computing and Intelligence Systems, {CCIS} 2012, Hangzhou, China, October 30 - November 1, 2012}, pages = {666--669}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CCIS.2012.6664258}, doi = {10.1109/CCIS.2012.6664258}, timestamp = {Sun, 08 Aug 2021 01:40:48 +0200}, biburl = {https://dblp.org/rec/conf/ccis/TianW12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/DoughertyG12, author = {Daniel J. Dougherty and Joshua D. Guttman}, editor = {Catuscia Palamidessi and Mark Dermot Ryan}, title = {An Algebra for Symbolic Diffie-Hellman Protocol Analysis}, booktitle = {Trustworthy Global Computing - 7th International Symposium, {TGC} 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8191}, pages = {164--181}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-41157-1\_11}, doi = {10.1007/978-3-642-41157-1\_11}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tgc/DoughertyG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-8114, author = {Boaz Tsaban}, title = {Polynomial time cryptanalysis of noncommutative-algebraic key exchange protocols}, journal = {CoRR}, volume = {abs/1210.8114}, year = {2012}, url = {http://arxiv.org/abs/1210.8114}, eprinttype = {arXiv}, eprint = {1210.8114}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-8114.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Tsaban12, author = {Boaz Tsaban}, title = {Polynomial time cryptanalysis of noncommutative-algebraic key exchange protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2012}, url = {http://eprint.iacr.org/2012/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Tsaban12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CarlK11, author = {Glenn Carl and George Kesidis}, title = {Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra}, journal = {Comput. Networks}, volume = {55}, number = {10}, pages = {2361--2379}, year = {2011}, url = {https://doi.org/10.1016/j.comnet.2011.03.013}, doi = {10.1016/J.COMNET.2011.03.013}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CarlK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eceasst/BhandalBH11, author = {Colm Bhandal and M{\'{e}}lanie Bouroche and Arthur Hughes}, title = {A Process Algebraic Description of a Temporal Wireless Network Protocol}, journal = {Electron. Commun. Eur. Assoc. Softw. Sci. Technol.}, volume = {45}, year = {2011}, url = {https://doi.org/10.14279/tuj.eceasst.45.660}, doi = {10.14279/TUJ.ECEASST.45.660}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eceasst/BhandalBH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1110-0732, author = {Iaakov Exman and Radel Ben{-}Av}, title = {Z-States Algebra for a Tunable Multi-Party Entanglement-Distillation Protocol}, journal = {CoRR}, volume = {abs/1110.0732}, year = {2011}, url = {http://arxiv.org/abs/1110.0732}, eprinttype = {arXiv}, eprint = {1110.0732}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1110-0732.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cca/project10, author = {The SCIEnce project}, title = {Symbolic computation software composability protocol and its implementations}, journal = {{ACM} Commun. Comput. Algebra}, volume = {44}, number = {3/4}, pages = {210--212}, year = {2010}, url = {https://doi.org/10.1145/1940475.1940522}, doi = {10.1145/1940475.1940522}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cca/project10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1003-5385, author = {Sreekanth Malladi and Pascal Lafourcade}, title = {How to prevent type-flaw attacks on security protocols under algebraic properties}, journal = {CoRR}, volume = {abs/1003.5385}, year = {2010}, url = {http://arxiv.org/abs/1003.5385}, eprinttype = {arXiv}, eprint = {1003.5385}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1003-5385.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yagisawa10a, author = {Masahiro Yagisawa}, title = {Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2010}, url = {http://eprint.iacr.org/2010/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yagisawa10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/PetrakosDMS09, author = {Nikolaos Petrakos and George W. Dinolt and James Bret Michael and Pantelimon Stanica}, title = {Cube-Type Algebraic Attacks on Wireless Encryption Protocols}, journal = {Computer}, volume = {42}, number = {10}, pages = {103--105}, year = {2009}, url = {https://doi.org/10.1109/MC.2009.318}, doi = {10.1109/MC.2009.318}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/PetrakosDMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Ramezanian09, author = {Rasoul Ramezanian}, title = {Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {1}, number = {1}, pages = {55--67}, year = {2009}, url = {https://doi.org/10.22042/isecure.2015.1.1.6}, doi = {10.22042/ISECURE.2015.1.1.6}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Ramezanian09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Jurjens09, author = {Jan J{\"{u}}rjens}, title = {A domain-specific language for cryptographic protocols based on streams}, journal = {J. Log. Algebraic Methods Program.}, volume = {78}, number = {2}, pages = {54--73}, year = {2009}, url = {https://doi.org/10.1016/j.jlap.2008.08.006}, doi = {10.1016/J.JLAP.2008.08.006}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Jurjens09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ideas/CrassKS09, author = {Stefan Cra{\ss} and Eva K{\"{u}}hn and Gernot Salzer}, editor = {Bipin C. Desai and Domenico Sacc{\`{a}} and Sergio Greco}, title = {Algebraic foundation of a data model for an extensible space-based collaboration protocol}, booktitle = {International Database Engineering and Applications Symposium {(IDEAS} 2009), September 16-18, 2009, Cetraro, Calabria, Italy}, series = {{ACM} International Conference Proceeding Series}, pages = {301--306}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1620432.1620466}, doi = {10.1145/1620432.1620466}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ideas/CrassKS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rta/BursucC09, author = {Sergiu Bursuc and Hubert Comon{-}Lundh}, editor = {Ralf Treinen}, title = {Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions}, booktitle = {Rewriting Techniques and Applications, 20th International Conference, {RTA} 2009, Bras{\'{\i}}lia, Brazil, June 29 - July 1, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5595}, pages = {133--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02348-4\_10}, doi = {10.1007/978-3-642-02348-4\_10}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/rta/BursucC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/DeursenR09, author = {Ton van Deursen and Sasa Radomirovic}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Algebraic Attacks on {RFID} Protocols}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {38--51}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_4}, doi = {10.1007/978-3-642-03944-7\_4}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/DeursenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BoichutHK09, author = {Yohan Boichut and Pierre{-}Cyrille H{\'{e}}am and Olga Kouchnarenko}, editor = {Peter Habermehl and Tom{\'{a}}s Vojnar}, title = {Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives}, booktitle = {Joint Proceedings of the 8th, 9th, and 10th International Workshops on Verification of Infinite-State Systems, {INFINITY} 2006 / 2007 / 2008, Bonn, Germany, August 26, 2006 / Lisbon, Portugal, September 8, 2007 / Toronto, Canada, August 23, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {239}, pages = {57--72}, publisher = {Elsevier}, year = {2009}, url = {https://doi.org/10.1016/j.entcs.2009.05.030}, doi = {10.1016/J.ENTCS.2009.05.030}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/BoichutHK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/0001S09, author = {Matthias Krause and Dirk Stegemann}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {Algebraic Attacks against Linear {RFID} Authentication Protocols}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1957/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/0001S09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/BlanchetAF08, author = {Bruno Blanchet and Mart{\'{\i}}n Abadi and C{\'{e}}dric Fournet}, title = {Automated verification of selected equivalences for security protocols}, journal = {J. Log. Algebraic Methods Program.}, volume = {75}, number = {1}, pages = {3--51}, year = {2008}, url = {https://doi.org/10.1016/j.jlap.2007.06.002}, doi = {10.1016/J.JLAP.2007.06.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/BlanchetAF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Kramer08, author = {Simon Kramer}, title = {Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography}, journal = {J. Log. Algebraic Methods Program.}, volume = {77}, number = {1-2}, pages = {60--91}, year = {2008}, url = {https://doi.org/10.1016/j.jlap.2008.05.005}, doi = {10.1016/J.JLAP.2008.05.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Kramer08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/McIverGCM08, author = {A. K. McIver and Carlos Gonzal{\'{\i}}a and Ernie Cohen and Carroll C. Morgan}, title = {Using probabilistic Kleene algebra pKA for protocol verification}, journal = {J. Log. Algebraic Methods Program.}, volume = {76}, number = {1}, pages = {90--111}, year = {2008}, url = {https://doi.org/10.1016/j.jlap.2007.10.005}, doi = {10.1016/J.JLAP.2007.10.005}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlp/McIverGCM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OstrovskyS08, author = {Rafail Ostrovsky and William E. Skeith III}, editor = {David A. Wagner}, title = {Communication Complexity in Algebraic Two-Party Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {379--396}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_21}, doi = {10.1007/978-3-540-85174-5\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OstrovskyS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnsc/TanGL08, author = {Fuxiao Tan and Xinping Guan and Derong Liu}, title = {The consensus protocol for multi-agent systems based on the algebraic connectivity}, booktitle = {Proceedings of the {IEEE} International Conference on Networking, Sensing and Control, {ICNSC} 2008, Hainan, China, 6-8 April 2008}, pages = {310--313}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICNSC.2008.4525231}, doi = {10.1109/ICNSC.2008.4525231}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnsc/TanGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsoc/MateescuPS08, author = {Radu Mateescu and Pascal Poizat and Gwen Sala{\"{u}}n}, editor = {Athman Bouguettaya and Ingolf Kr{\"{u}}ger and Tiziana Margaria}, title = {Adaptation of Service Protocols Using Process Algebra and On-the-Fly Reduction Techniques}, booktitle = {Service-Oriented Computing - {ICSOC} 2008, 6th International Conference, Sydney, Australia, December 1-5, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5364}, pages = {84--99}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89652-4\_10}, doi = {10.1007/978-3-540-89652-4\_10}, timestamp = {Sun, 02 Jun 2019 21:20:23 +0200}, biburl = {https://dblp.org/rec/conf/icsoc/MateescuPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0802-3328, author = {Manas K. Patra and Yan Zhang}, title = {An Algebraic Characterization of Security of Cryptographic Protocols}, journal = {CoRR}, volume = {abs/0802.3328}, year = {2008}, url = {http://arxiv.org/abs/0802.3328}, eprinttype = {arXiv}, eprint = {0802.3328}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0802-3328.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aamas/MallyaS07, author = {Ashok U. Mallya and Munindar P. Singh}, title = {An algebra for commitment protocols}, journal = {Auton. Agents Multi Agent Syst.}, volume = {14}, number = {2}, pages = {143--163}, year = {2007}, url = {https://doi.org/10.1007/s10458-006-7232-1}, doi = {10.1007/S10458-006-7232-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aamas/MallyaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/DelicataS07, author = {Rob Delicata and Steve A. Schneider}, title = {An algebraic approach to the verification of a class of Diffie-Hellman protocols}, journal = {Int. J. Inf. Sec.}, volume = {6}, number = {2-3}, pages = {183--196}, year = {2007}, url = {https://doi.org/10.1007/s10207-007-0013-2}, doi = {10.1007/S10207-007-0013-2}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/DelicataS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/BaldoniBMP07, author = {Matteo Baldoni and Cristina Baroglio and Alberto Martelli and Viviana Patti}, title = {Reasoning about interaction protocols for customizing web service selection and composition}, journal = {J. Log. Algebraic Methods Program.}, volume = {70}, number = {1}, pages = {53--73}, year = {2007}, url = {https://doi.org/10.1016/j.jlap.2006.05.005}, doi = {10.1016/J.JLAP.2006.05.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/BaldoniBMP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/JohnsonLLV07, author = {James E. Johnson and David E. Langworthy and Leslie Lamport and Friedrich H. Vogt}, title = {Formal specification of a Web services protocol}, journal = {J. Log. Algebraic Methods Program.}, volume = {70}, number = {1}, pages = {34--52}, year = {2007}, url = {https://doi.org/10.1016/j.jlap.2006.05.004}, doi = {10.1016/J.JLAP.2006.05.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/JohnsonLLV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/PangFHV07, author = {Jun Pang and Wan J. Fokkink and Rutger F. H. Hofman and Ronald Veldema}, title = {Model checking a cache coherence protocol of a Java {DSM} implementation}, journal = {J. Log. Algebraic Methods Program.}, volume = {71}, number = {1}, pages = {1--43}, year = {2007}, url = {https://doi.org/10.1016/j.jlap.2006.08.007}, doi = {10.1016/J.JLAP.2006.08.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/PangFHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bis/Picard07, author = {Willy Picard}, editor = {Witold Abramowicz}, title = {An Algebraic Algorithm for Structural Validation of Social Protocols}, booktitle = {Business Information Systems, 10th International Conference, {BIS} 2007, Poznan, Poland, April 25-27, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4439}, pages = {570--583}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72035-5\_45}, doi = {10.1007/978-3-540-72035-5\_45}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/bis/Picard07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cai/OuranosS07, author = {Iakovos Ouranos and Petros S. Stefaneas}, editor = {Symeon Bozapalidis and George Rahonis}, title = {Verifying Security Protocols for Sensor Networks Using Algebraic Specification Techniques}, booktitle = {Algebraic Informatics, Second International Conference, {CAI} 2007, Thessaloniki, Greece, May 21-25, 2007, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {4728}, pages = {247--259}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75414-5\_16}, doi = {10.1007/978-3-540-75414-5\_16}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cai/OuranosS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/calco/FiadeiroS07, author = {Jos{\'{e}} Luiz Fiadeiro and Vincent Schmitt}, editor = {Till Mossakowski and Ugo Montanari and Magne Haveraaen}, title = {Structured Co-spans: An Algebra of Interaction Protocols}, booktitle = {Algebra and Coalgebra in Computer Science, Second International Conference, {CALCO} 2007, Bergen, Norway, August 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4624}, pages = {194--208}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73859-6\_14}, doi = {10.1007/978-3-540-73859-6\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/calco/FiadeiroS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/TrincaR07, author = {Dragos Trinca and Sanguthevar Rajasekaran}, title = {Towards a Collusion-Resistant Algebraic Multi-Party Protocol for Privacy-Preserving Association Rule Mining in Vertically Partitioned Data}, booktitle = {Proceedings of the 26th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New Orleans, Louisiana, {USA}}, pages = {402--409}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PCCC.2007.358920}, doi = {10.1109/PCCC.2007.358920}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/TrincaR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/VereshchaginBCKLP07, author = {Nikolai K. Vereshchagin and Harry Buhrman and Matthias Christandl and Michal Kouck{\'{y}} and Zvi Lotker and Boaz Patt{-}Shamir}, editor = {Manindra Agrawal and Harry Buhrman and Lance Fortnow and Thomas Thierauf}, title = {High Entropy Random Selection Protocols}, booktitle = {Algebraic Methods in Computational Complexity, 07.10. - 12.10.2007}, series = {Dagstuhl Seminar Proceedings}, volume = {07411}, publisher = {Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany}, year = {2007}, url = {http://drops.dagstuhl.de/opus/volltexte/2008/1309}, timestamp = {Thu, 10 Jun 2021 13:02:08 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/VereshchaginBCKLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Delaune06, author = {St{\'{e}}phanie Delaune}, title = {V{\'{e}}rification des protocoles cryptographiques et propri{\'{e}}t{\'{e}}s alg{\'{e}}briques. (Verification of cryptographic protocols with algebraic properties)}, school = {{\'{E}}cole normale sup{\'{e}}rieure de Cachan, France}, year = {2006}, url = {https://tel.archives-ouvertes.fr/tel-00132677}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Delaune06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/AnshelAG06, author = {Iris Anshel and Michael Anshel and Dorian Goldfeld}, title = {A Linear Time Matrix Key Agreement Protocol Over Small Finite Fields}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {17}, number = {3-4}, pages = {195--203}, year = {2006}, url = {https://doi.org/10.1007/s00200-006-0001-1}, doi = {10.1007/S00200-006-0001-1}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/AnshelAG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/TalpinG06, author = {Jean{-}Pierre Talpin and Paul {Le Guernic}}, title = {An algebraic theory for behavioral modeling and protocol synthesis in system design}, journal = {Formal Methods Syst. Des.}, volume = {28}, number = {2}, pages = {131--151}, year = {2006}, url = {https://doi.org/10.1007/s10703-006-7845-7}, doi = {10.1007/S10703-006-7845-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fmsd/TalpinG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CortierDL06, author = {V{\'{e}}ronique Cortier and St{\'{e}}phanie Delaune and Pascal Lafourcade}, title = {A survey of algebraic properties used in cryptographic protocols}, journal = {J. Comput. Secur.}, volume = {14}, number = {1}, pages = {1--43}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14101}, doi = {10.3233/JCS-2006-14101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CortierDL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/RelMiCS/McIverCM06, author = {Annabelle McIver and Ernie Cohen and Carroll Morgan}, editor = {Renate A. Schmidt}, title = {Using Probabilistic Kleene Algebra for Protocol Verification}, booktitle = {Relations and Kleene Algebra in Computer Science, 9th International Conference on Relational Methods in Computer Science and 4th International Workshop on Applications of Kleene Algebra, RelMiCS/AKA 2006, Manchester, UK, August 29-September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4136}, pages = {296--310}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11828563\_20}, doi = {10.1007/11828563\_20}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/RelMiCS/McIverCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esaw/MillerM06, author = {Tim Miller and Peter McBurney}, editor = {Gregory M. P. O'Hare and Alessandro Ricci and Michael J. O'Grady and Oguz Dikenelli}, title = {Using Constraints and Process Algebra for Specification of First-Class Agent Interaction Protocols}, booktitle = {Engineering Societies in the Agents World VII, 7th International Workshop, {ESAW} 2006, Dublin, Ireland, September 6-8, 2006 Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {4457}, pages = {245--264}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-75524-1\_14}, doi = {10.1007/978-3-540-75524-1\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/esaw/MillerM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/BoichutHK06, author = {Yohan Boichut and Pierre{-}Cyrille H{\'{e}}am and Olga Kouchnarenko}, editor = {Kamel Barkaoui and Ana Cavalcanti and Antonio Cerone}, title = {Handling Algebraic Properties in Automatic Analysis of Security Protocols}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2006, Third International Colloquium, Tunis, Tunisia, November 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4281}, pages = {153--167}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11921240\_11}, doi = {10.1007/11921240\_11}, timestamp = {Mon, 21 Feb 2022 14:40:49 +0100}, biburl = {https://dblp.org/rec/conf/ictac/BoichutHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscc/Hagalisletto06, author = {Anders Moen Hagalisletto}, editor = {Paolo Bellavista and Chi{-}Ming Chen and Antonio Corradi and Mahmoud Daneshmand}, title = {Protocol Algebra}, booktitle = {Proceedings of the 11th {IEEE} Symposium on Computers and Communications {(ISCC} 2006), 26-29 June 2006, Cagliari, Sardinia, Italy}, pages = {394--401}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ISCC.2006.133}, doi = {10.1109/ISCC.2006.133}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscc/Hagalisletto06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/RuizCCP06, author = {M. Carmen Ruiz and Diego Cazorla and Fernando Cuartero and Juan Jos{\'{e}} Pardo}, editor = {Hisham Haddad}, title = {Analysis of the {SET} e-commerce protocol using a true concurrency process algebra}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {879--886}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141480}, doi = {10.1145/1141277.1141480}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/RuizCCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BistarelliCLM05, author = {Stefano Bistarelli and Iliano Cervesato and Gabriele Lenzini and Fabio Martinelli}, title = {Relating multiset rewriting and process algebras for security protocol analysis}, journal = {J. Comput. Secur.}, volume = {13}, number = {1}, pages = {3--47}, year = {2005}, url = {https://doi.org/10.3233/jcs-2005-13102}, doi = {10.3233/JCS-2005-13102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BistarelliCLM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Amadio05, author = {Roberto M. Amadio}, title = {Guest editor's introduction: Special issue on Modelling and Verification of Cryptographic Protocols}, journal = {J. Log. Algebraic Methods Program.}, volume = {64}, number = {2}, pages = {155}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.09.001}, doi = {10.1016/J.JLAP.2004.09.001}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Amadio05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/BozgaEL05, author = {Liana Bozga and Cristian Ene and Yassine Lakhnech}, title = {A symbolic decision procedure for cryptographic protocols with time stamps}, journal = {J. Log. Algebraic Methods Program.}, volume = {65}, number = {1}, pages = {1--35}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.09.007}, doi = {10.1016/J.JLAP.2004.09.007}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/BozgaEL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/EvansS05, author = {Neil Evans and Steve A. Schneider}, title = {Verifying security protocols with {PVS:} widening the rank function approach}, journal = {J. Log. Algebraic Methods Program.}, volume = {64}, number = {2}, pages = {253--284}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.09.005}, doi = {10.1016/J.JLAP.2004.09.005}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/EvansS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Goubault-LarrecqRV05, author = {Jean Goubault{-}Larrecq and Muriel Roger and Kumar Neeraj Verma}, title = {Abstraction and resolution modulo {AC:} How to verify Diffie-Hellman-like protocols automatically}, journal = {J. Log. Algebraic Methods Program.}, volume = {64}, number = {2}, pages = {219--251}, year = {2005}, url = {https://doi.org/10.1016/j.jlap.2004.09.004}, doi = {10.1016/J.JLAP.2004.09.004}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Goubault-LarrecqRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/synasc/CiobanuS05, author = {Gabriel Ciobanu and K. N. Sridhar}, editor = {Daniela Zaharie and Dana Petcu and Viorel Negru and Tudor Jebelean and Gabriel Ciobanu and Alexandru Cicortas and Ajith Abraham and Marcin Paprzycki}, title = {Specifications and Verification of Network Protocols by Process Algebra}, booktitle = {Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing {(SYNASC} 2005), 25-29 September 2005, Timisoara, Romania}, pages = {250--258}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SYNASC.2005.68}, doi = {10.1109/SYNASC.2005.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/synasc/CiobanuS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/HuaiL04, author = {Jinpeng Huai and Xianxian Li}, title = {Algebra model and security analysis for cryptographic protocols}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {47}, number = {2}, pages = {199--220}, year = {2004}, url = {https://doi.org/10.1360/02yf0185}, doi = {10.1360/02YF0185}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/HuaiL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/JmaielP03, author = {Mohamed Jmaiel and Peter Pepper}, title = {Development of communication protocols using algebraic and temporal specifications}, journal = {Comput. Networks}, volume = {42}, number = {6}, pages = {737--764}, year = {2003}, url = {https://doi.org/10.1016/S1389-1286(03)00215-9}, doi = {10.1016/S1389-1286(03)00215-9}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/JmaielP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/GorrieriM03, author = {Roberto Gorrieri and Fabio Martinelli}, editor = {Branislav Rovan and Peter Vojt{\'{a}}s}, title = {Process Algebraic Frameworks for the Specification and Analysis of Cryptographic Protocols}, booktitle = {Mathematical Foundations of Computer Science 2003, 28th International Symposium, {MFCS} 2003, Bratislava, Slovakia, August 25-29, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2747}, pages = {46--67}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45138-9\_3}, doi = {10.1007/978-3-540-45138-9\_3}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/GorrieriM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/BistarelliCLM03, author = {Stefano Bistarelli and Iliano Cervesato and Gabriele Lenzini and Fabio Martinelli}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Relating Process Algebras and Multiset Rewriting for Immediate Decryption Protocols}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {86--99}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_7}, doi = {10.1007/978-3-540-45215-7\_7}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/BistarelliCLM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/BengtssonGKLLPY02, author = {Johan Bengtsson and W. O. David Griffioen and K{\aa}re J. Kristoffersen and Kim Guldstrand Larsen and Fredrik Larsson and Paul Pettersson and Wang Yi}, title = {Automated verification of an audio-control protocol using {UPPAAL}}, journal = {J. Log. Algebraic Methods Program.}, volume = {52-53}, pages = {163--181}, year = {2002}, url = {https://doi.org/10.1016/S1567-8326(02)00036-X}, doi = {10.1016/S1567-8326(02)00036-X}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/BengtssonGKLLPY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/DaleyS02, author = {Daryl J. Daley and Leslie D. Servi}, title = {Loss Probabilities of Hand-in Traffic under Various Protocols, {I:} Models and Algebraic Results}, journal = {Telecommun. Syst.}, volume = {19}, number = {2}, pages = {209--226}, year = {2002}, url = {https://doi.org/10.1023/A:1013346126834}, doi = {10.1023/A:1013346126834}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/DaleyS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/GrooteS01, author = {Jan Friso Groote and Jan Springintveld}, title = {Focus points and convergent process operators: a proof strategy for protocol verification}, journal = {J. Log. Algebraic Methods Program.}, volume = {49}, number = {1-2}, pages = {31--60}, year = {2001}, url = {https://doi.org/10.1016/S1567-8326(01)00010-8}, doi = {10.1016/S1567-8326(01)00010-8}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/GrooteS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MeyerNP01, author = {Andreas Meyer and Stefan Neis and Thomas Pfahler}, editor = {Vijay Varadharajan and Yi Mu}, title = {First Implementation of Cryptographic Protocols Based on Algebraic Number Fields}, booktitle = {Information Security and Privacy, 6th Australasian Conference, {ACISP} 2001, Sydney, Australia, July 11-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2119}, pages = {84--103}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-47719-5\_9}, doi = {10.1007/3-540-47719-5\_9}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MeyerNP01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amast/Cerone00, author = {Antonio Cerone}, editor = {Teodor Rus}, title = {Process Algebra versus Axiomatic Specification of a Real-Time Protocol}, booktitle = {Algebraic Methodology and Software Technology. 8th International Conference, {AMAST} 2000, Iowa City, Iowa, USA, May 20-27, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1816}, pages = {57--72}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45499-3\_7}, doi = {10.1007/3-540-45499-3\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/amast/Cerone00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/forte/BorealeNP00, author = {Michele Boreale and Rocco De Nicola and Rosario Pugliese}, editor = {Tommaso Bolognesi and Diego Latella}, title = {Process Algebraic Analysis of Cryptographic Protocols}, booktitle = {Formal Techniques for Distributed System Development, {FORTE/PSTV} 2000, {IFIP} {TC6} {WG6.1} Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols {(FORTE} {XIII)} and Protocol Specification, Testing and Verification {(PSTV} XX), October 10-13, 2000, Pisa, Italy}, series = {{IFIP} Conference Proceedings}, volume = {183}, pages = {375--392}, publisher = {Kluwer}, year = {2000}, timestamp = {Tue, 19 Feb 2002 10:53:34 +0100}, biburl = {https://dblp.org/rec/conf/forte/BorealeNP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/Jmaiel00, author = {Mohamed Jmaiel}, title = {A Unified Algebraic Framework for Specifying Communication Protocols}, booktitle = {3rd {IEEE} International Conference on Formal Engineering Methods, {ICFEM} 2000, York, England, UK, September 4-7, 2000, Proceedings}, pages = {57--66}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICFEM.2000.873805}, doi = {10.1109/ICFEM.2000.873805}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfem/Jmaiel00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifm/Grosse-Rhode99, author = {Martin Gro{\ss}e{-}Rhode}, editor = {Keijiro Araki and Andy Galloway and Kenji Taguchi}, title = {A Compositional Comparison of Specifications of the Alternating Bit Protocol in {CCS} and {UNITY} Based on Algebra Transformation Systems}, booktitle = {Integrated Formal Methods, Proceedings of the 1st International Conference on Integrated Formal Methods, {IFM} 99, York, UK, 28-29 June 1999}, pages = {253--272}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-1-4471-0851-1\_14}, doi = {10.1007/978-1-4471-0851-1\_14}, timestamp = {Fri, 21 Jun 2019 13:08:59 +0200}, biburl = {https://dblp.org/rec/conf/ifm/Grosse-Rhode99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:journals/entcs/VlijmenW99a, author = {Sebastiaan van Vlijmen and Jos van Wamel}, editor = {Sebastiaan van Vlijmen and Arjan van Waveren and Paul Vriend}, title = {A Semantic Approach to Protocold}, booktitle = {Algebraic Specification in Action}, series = {Electronic Notes in Theoretical Computer Science}, volume = {21}, pages = {1--32}, publisher = {Elsevier}, year = {1999}, url = {https://doi.org/10.1016/S1571-0661(05)01187-4}, doi = {10.1016/S1571-0661(05)01187-4}, timestamp = {Fri, 11 Nov 2022 15:01:32 +0100}, biburl = {https://dblp.org/rec/journals/entcs/VlijmenW99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/DjemameGMB98, author = {Karim Djemame and Dennis C. Gilles and Lewis M. Mackenzie and Mohamed Bettaz}, title = {Performance comparison of high-level algebraic nets distributed simulation protocols}, journal = {J. Syst. Archit.}, volume = {44}, number = {6-7}, pages = {457--472}, year = {1998}, url = {https://doi.org/10.1016/S1383-7621(97)00058-1}, doi = {10.1016/S1383-7621(97)00058-1}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/DjemameGMB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fmsp/Chen98, author = {Liang Chen}, editor = {Mark A. Ardis and Joanne M. Atlee}, title = {Verification of an audio control protocol within real time process algebra}, booktitle = {Proceedings of the Second Workshop on Formal Methods in Software Practice, March 4-5, 1998, Clearwater Beach, Florida, {USA}}, pages = {70--77}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/298595.298860}, doi = {10.1145/298595.298860}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fmsp/Chen98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/FredlundGK97, author = {Lars{-}{\AA}ke Fredlund and Jan Friso Groote and Henri Korver}, title = {Formal Verification of a Leader Election Protocol in Process Algebra}, journal = {Theor. Comput. Sci.}, volume = {177}, number = {2}, pages = {459--486}, year = {1997}, url = {https://doi.org/10.1016/S0304-3975(96)00256-3}, doi = {10.1016/S0304-3975(96)00256-3}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/FredlundGK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hybrid/CeroneCMM97, author = {Antonio Cerone and Alex J. Cowie and George J. Milne and Philip A. Moseley}, editor = {Oded Maler}, title = {Modelling a Time-Dependent Protocol Using the Circal Process Algebra}, booktitle = {Hybrid and Real-Time Systems, International Workshop. HART'97, Grenoble, France, March 26-28, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1201}, pages = {124--138}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0014721}, doi = {10.1007/BFB0014721}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hybrid/CeroneCMM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Jmaiel96, author = {Mohamed Jmaiel}, title = {Development of communication protocols with algebraic temporal specifications}, school = {Technical University of Berlin, Germany}, year = {1996}, url = {https://d-nb.info/946938393}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Jmaiel96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pds/CowlingN96, author = {Anthony J. Cowling and M. C. Nike}, editor = {Innes Jelly and Ian Gorton and Peter R. Croll}, title = {Using data flow algebra to analyse the alternating bit protocol}, booktitle = {Software Engineering for Parallel and Distributed Systems, Proceedings of the First {IFIP} {TC10} International Workshop on Parallel and Distributed Software Engineering, March 1996}, series = {{IFIP} Conference Proceedings}, volume = {50}, pages = {195--207}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Thu, 03 Jan 2002 12:07:19 +0100}, biburl = {https://dblp.org/rec/conf/pds/CowlingN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsc/DjemameBGM96, author = {Karim Djemame and Mohamed Bettaz and Dennis C. Gilles and Lewis M. Mackenzie}, editor = {John M. Charnes and Douglas J. Morrice and Daniel T. Brunner and James J. Swain}, title = {Performance Comparison of High-Level Algebraic Nets Distributed Simulation Protocols}, booktitle = {Proceedings of the 28th conference on Winter simulation, {WSC} 1996, Coronado, CA, USA, December 8-11, 1996}, pages = {621--628}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.ieeecomputersociety.org/10.1109/WSC.1996.873343}, doi = {10.1109/WSC.1996.873343}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wsc/DjemameBGM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pstv/Jmaiel95, author = {Mohamed Jmaiel}, editor = {Piotr Dembinski and Marek Sredniawa}, title = {An algebraic-temporal specification of a CSMA/CD-protocol}, booktitle = {Protocol Specification, Testing and Verification XV, Proceedings of the Fifteenth {IFIP} {WG6.1} International Symposium on Protocol Specification, Testing and Verification, Warsaw, Poland, June 1995}, series = {{IFIP} Conference Proceedings}, volume = {38}, pages = {187--202}, publisher = {Chapman {\&} Hall}, year = {1995}, timestamp = {Thu, 03 Jan 2002 12:07:46 +0100}, biburl = {https://dblp.org/rec/conf/pstv/Jmaiel95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/SistoCV92, author = {Riccardo Sisto and Luigi Ciminiera and Adriano Valenzano}, title = {Probabilistic Characterization of Algebraic Protocol Specifications}, booktitle = {Proceedings of the 12th International Conference on Distributed Computing Systems, Yokohama, Japan, June 9-12, 1992}, pages = {260--268}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/ICDCS.1992.235032}, doi = {10.1109/ICDCS.1992.235032}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/SistoCV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/wsscs/HigashinoTKFM91, author = {Teruo Higashino and Kenichi Taniguchi and Tadao Kasami and Mamoru Fujii and Masaaki Mori}, editor = {Ikuo Nakata and Masami Hagiya}, title = {An Algebraic Method For Verifying Progress Property of Communication Protocols}, booktitle = {Software Science and Engineering: Selected Papers from the Kyoto Symposia}, series = {World Scientific Series in Computer Science}, volume = {31}, pages = {39--59}, publisher = {World Scientific}, year = {1991}, url = {https://doi.org/10.1142/9789814360128\_0003}, doi = {10.1142/9789814360128\_0003}, timestamp = {Tue, 23 Jun 2020 13:49:03 +0200}, biburl = {https://dblp.org/rec/series/wsscs/HigashinoTKFM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adt/Bettaz90, author = {Mohamed Bettaz}, editor = {Hartmut Ehrig and Klaus P. Jantke and Fernando Orejas and Horst Reichel}, title = {An Association of Algebraic Term Nets and Abstract Data Types for Specifying Real Communication Protocols}, booktitle = {Recent Trends in Data Type Specification, Proceedings 7th Workshop on Abstract Data Types, Wusterhausen, Dosse, Germany, April 17-20, 1990}, series = {Lecture Notes in Computer Science}, volume = {534}, pages = {11--30}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-54496-8\_2}, doi = {10.1007/3-540-54496-8\_2}, timestamp = {Sun, 06 Oct 2024 20:55:43 +0200}, biburl = {https://dblp.org/rec/conf/adt/Bettaz90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iee/LombardoP89, author = {Alfio Lombardo and Sergio Palazzo}, title = {An extended algebra for the validation of communication protocols}, journal = {Softw. Eng. J.}, volume = {4}, number = {3}, pages = {148--158}, year = {1989}, url = {https://doi.org/10.1049/sej.1989.0018}, doi = {10.1049/SEJ.1989.0018}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iee/LombardoP89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/HigashinoFTKM89, author = {Teruo Higashino and Mamoru Fujii and Kenichi Taniguchi and Tadao Kasami and Masaaki Mori}, title = {Verification of safeness and mutual exclusion properties of algebraically specified token ring {LAN} protocol}, journal = {Syst. Comput. Jpn.}, volume = {20}, number = {5}, pages = {57--68}, year = {1989}, url = {https://doi.org/10.1002/scj.4690200506}, doi = {10.1002/SCJ.4690200506}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/HigashinoFTKM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/LeeL88, author = {Tony T. Lee and Ming{-}Yee Lai}, title = {A Relational Algebraic Approach to Protocol Verification}, journal = {{IEEE} Trans. Software Eng.}, volume = {14}, number = {2}, pages = {184--193}, year = {1988}, url = {https://doi.org/10.1109/32.4637}, doi = {10.1109/32.4637}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/LeeL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/es/Soriano87, author = {Orlando Pereda}, title = {Validaci{\'{o}}n de protocolos, una aproximaci{\'{o}}n algebraica}, school = {Technical University of Madrid, Spain}, year = {1987}, url = {https://oa.upm.es/10327/}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/es/Soriano87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/HigashinoTKFM87, author = {Teruo Higashino and Kenichi Taniguchi and Tadao Kasami and Mamoru Fujii and Masaaki Mori}, title = {Verification of progress property of algebraically specified communication protocols}, journal = {Syst. Comput. Jpn.}, volume = {18}, number = {9}, pages = {96--107}, year = {1987}, url = {https://doi.org/10.1002/scj.4690180910}, doi = {10.1002/SCJ.4690180910}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/HigashinoTKFM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/Kooken85, author = {C. J. Kooken}, title = {Algebraic Specification and Verification of Communicating Protocols}, journal = {Sci. Comput. Program.}, volume = {5}, number = {1}, pages = {1--36}, year = {1985}, url = {https://doi.org/10.1016/0167-6423(85)90002-4}, doi = {10.1016/0167-6423(85)90002-4}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/Kooken85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BookO85a, author = {Ronald V. Book and Friedrich Otto}, title = {On the Verifiability of Two-Party Algebraic Protocols}, journal = {Theor. Comput. Sci.}, volume = {40}, pages = {101--130}, year = {1985}, url = {https://doi.org/10.1016/0304-3975(85)90161-6}, doi = {10.1016/0304-3975(85)90161-6}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BookO85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aii/BergstraK85, author = {Jan A. Bergstra and Jan Willem Klop}, editor = {Wolfgang Bibel and Klaus P. Jantke}, title = {Verification of an alternating bit protocol by means of process algebra}, booktitle = {Mathematical Methods of Specification and Synthesis of Software Systems '85, Proceedings of the International Spring School, Wendisch-Rietz, GDR, April 22-26, 1985}, series = {Lecture Notes in Computer Science}, volume = {215}, pages = {9--23}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-16444-8\_1}, doi = {10.1007/3-540-16444-8\_1}, timestamp = {Sun, 06 Oct 2024 20:55:55 +0200}, biburl = {https://dblp.org/rec/conf/aii/BergstraK85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pstv/StefanoMM85, author = {Antonella Di Stefano and Michele Malgeri and Orazio Mirabella}, editor = {Michel Diaz}, title = {A specification of a {PROWAY} protocol with an Algebraic language}, booktitle = {Protocol Specification, Testing and Verification V, Proceedings of the {IFIP} {WG6.1} Fifth International Conference on Protocol Specification, Testing and Verification, Toulouse-Moissac, France, June 10-13, 1985}, pages = {195--213}, publisher = {North-Holland}, year = {1985}, timestamp = {Mon, 07 Jan 2002 16:07:03 +0100}, biburl = {https://dblp.org/rec/conf/pstv/StefanoMM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pstv/NounouY84, author = {Nihal Nounou and Yechiam Yemini}, editor = {Yechiam Yemini and Robert E. Strom and Shaula Yemini}, title = {Algebraic Specification-Based Performance Analysis of Communication Protocols}, booktitle = {Protocol Specification, Testing and Verification IV, Proceedings of the {IFIP} {WG6.1} Fourth International Workshop on Protocol Specification, Testing and Verification, Skytop Lodge, PA, USA, June 11-14, 1984}, pages = {541--560}, publisher = {North-Holland}, year = {1984}, timestamp = {Tue, 25 Feb 2003 15:13:25 +0100}, biburl = {https://dblp.org/rec/conf/pstv/NounouY84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.