Related Papers

In this section you can find all the papers and articles being somehow related with PEAR:

tesi - italian
(Zipped PDF | GZipped PostScript)
ProtOK: un tool per l'analisi statica di protocolli crittografici, Francesco Placella. This document describes the design and implementation processes of PEAR; it also illustrates its architecture, its main algorithms and the underlying theory.
BFM04-1
(GZipped PostScript)
Compositional Analysis of Authentication Protocols, Michele Bugliesi, Riccardo Focardi and Matteo Maffei. In proceedings of The European Symposium on Programming (ESOP 2004), Barcelona, Spain, March 2004, LNCS 2986, Springer-Verlag, pages 140-154.
BFM04-2
(PDF)
Authenticity by Tagging and Typing, Michele Bugliesi, Riccardo Focardi and Matteo Maffei. In proceedings of 2nd ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code (FMSE 2004), ACM, pages 1-12, ISBN 1-58113-971-3.
FM04
(PostScript)
Rho-spi calculus at work: Authentication Case Studies, Riccardo Focardi and Matteo Maffei. In proceedings of Mefisto Project, Formal Methods for Security and Time, Electronic Notes in Theoretical Computer Science, Elsevier, August 2004, volume 99, pages 267-293.
FMP05
(PDF)
Inferring Authentication Tags, Riccardo Focardi, Matteo Maffei and Francesco Placella. In proceedings of 2005 IFIP WG 1.7, ACM SIGPLAN and GI FoMSESS Workshop on Issues in the Theory of Security (WITS 2005), ACM Digital Library, to appear.