@Book{Pierce91, author = {Benjamin C. Pierce}, title = {Basic Category Theory for Computer Sicentists}, publisher = {The {MIT} Press}, year = 1991} @Unpublished{DoghmiGuttmanThayer06a, author = {Shaddin F. Doghmi and Joshua D.~Guttman and F. Javier Thayer}, title = {Searching for Shapes in Cryptographic Protocols (Extended Version)}, note = {\url{http://eprint.iacr.org/2006/435}}, month = nov, year = 2006} @InProceedings{DoghmiGuttmanThayer07, author = {Shaddin F. Doghmi and Joshua D. Guttman and F. Javier Thayer}, title = {Searching for Shapes in Cryptographic Protocols}, booktitle = {Tools and Algorithms for Construction and Analysis of Systems {(TACAS)}}, year = 2007, series = {LNCS}, number = 4424, pages = {523--538}, month = mar, publisher = {Springer}, note = {Extended version at \url{http://eprint.iacr.org/2006/435}}} @InProceedings{Fay79, author = {M. Fay}, title = {First-order Unification in an Equational Theory}, booktitle = {Proc. 4th Workshop on Automated Deduction}, year = 1979} @Book{BaaderNipkow98, author = {Franz Baader and Tobias Nipkow}, title = {Term Rewriting and All That}, publisher = {Cambridge University Press}, year = 1998} @Book{Paulson91, author = {Laurence C. Paulson}, title = {ML for the Working Programmer}, publisher = {Cambridge University Press}, year = 1991} @Book{RobinsonVoronkov01, author = {Alan Robinson and Andrei Voronkov}, title = {Handbook of Automated Reasoning}, vol = 1, publisher = {The {MIT} Press}, year = 2001} @article{GoguenMeseguer92, author = "Joseph A. Goguen and Jose Meseguer", title = "Order-Sorted Algebra {I}: Equational Deduction for Multiple Inheritance, Overloading, Exceptions and Partial Operations", journal = "Theoretical Computer Science", volume = "105", number = "2", pages = "217-273", year = "1992", url = "citeseer.ist.psu.edu/goguen92ordersorted.html" } @inproceedings{Millen99, author = "Jonathan K. Millen", title = "A Necessarily Parallel Attack", booktitle = "Workshop on Formal Methods and Security Protocols, Part of the Federated Logic Conference", address = "Trento, Italy", editor = "Nevin Heintze and Edmund Clarke", year = "1999", url = "citeseer.ist.psu.edu/millen99necessarily.html" } @inproceedings{PavlovicMeadows06, author = "Dusko Pavlovic and Catherine Meadows", title = "Deriving Secrecy in Key Establishment Protocols", booktitle = "European Symposium on Research in Computer Security", month = sep, year = 2006, url = "http://www.kestrel.edu/home/people/pavlovic/security.html" } @article{GansnerNorth00, author = "Emden R. Gansner and Stephen C. North", title = "An open graph visualization system and its applications to software engineering", journal = "Soft\-ware --- Prac\-tice and Experience", volume = "30", number = "11", pages = "1203--1233", year = "2000", url = "citeseer.ist.psu.edu/gansner99open.html" } @Unpublished{Dijkstra82, author = {Edsger W. Dijkstra}, title = {Why numbering should start at zero}, note = {\url{http://www.cs.utexas.edu/users/EWD/transcriptions/EWD08xx/EWD831.html}}, month = aug, year = 1982} @article{GuttmanThayer02, author = {Joshua D. Guttman and F. Javier Thayer}, title = {Authentication tests and the structure of bundles}, journal = {Theor. Comput. Sci.}, volume = {283}, number = {2}, year = {2002}, pages = {333-380}, ee = {http://dx.doi.org/10.1016/S0304-3975(01)00139-6}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{ThayerEtal99, author = {F. Javier Thayer and Jonathan C. Herzog and Joshua D. Guttman}, title = {Strand Spaces: Proving Security Protocols Correct}, journal = {Journal of Computer Security}, volume = {7}, number = {1}, year = {1999}, bibsource = {DBLP, http://dblp.uni-trier.de} } @article{DolevYao83, author = "Daniel Dolev and Andrew Yao", title = "On the security of public-key protocols", journal = "{IEEE} Transactions on Information Theory", volume = 29, pages = "198--208", year = 1983 } @Manual{cpsatheory10, title = {{CPSA} Theory}, OPTkey = {}, author = {Moses D.~Liskov and John D.~Ramsdell and Paul D.~Rowe}, organization = {The MITRE Corporation}, OPTaddress = {}, OPTedition = {}, OPTmonth = {}, year = 2010, note = {In \url{http://hackage.haskell.org/package/cpsa} source distribution, \texttt{doc} directory}, OPTannote = {} } @Manual{cpsaspec09, title = {The {CPSA} Specification: A Reduction System for Searching for Shapes in Cryptographic Protocols}, OPTkey = {}, author = {John D.~Ramsdell and Joshua D.~Guttman and Paul D.~Rowe}, organization = {The MITRE Corporation}, OPTaddress = {}, OPTedition = {}, OPTmonth = {}, year = 2009, note = {In \url{http://hackage.haskell.org/package/cpsa} source distribution, \texttt{doc} directory}, OPTannote = {} } @InCollection{cpsa09, author = {John D. Ramsdell and Joshua D. Guttman}, title = {{CPSA}: A cryptographic protocol shapes analyzer}, booktitle = {Hackage}, OPTcrossref = {}, OPTkey = {}, OPTpages = {}, publisher = {The MITRE Corporation}, year = 2009, OPTeditor = {}, OPTvolume = {}, OPTnumber = {}, OPTseries = {}, OPTtype = {}, OPTchapter = {}, OPTaddress = {}, OPTedition = {}, OPTmonth = {}, note = {\url{http://hackage.haskell.org/package/cpsa}}, OPTannote = {} }