4 papers:
- FSE-2012-KwonS #component #detection
- Detecting and analyzing insecure component usage (TK, ZS), p. 5.
- LICS-2003-ChevalierKRT #protocol
- An NP Decision Procedure for Protocol Insecurity with XOR (YC, RK, MR, MT), pp. 261–270.
- LICS-2003-Comon-LundhS #constraints #deduction #theorem proving
- Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or (HCL, VS), p. 271–?.
- TOOLS-USA-1991-ConradB #programming #smalltalk
- Insecurities in Smalltalk Programming (BAC, ALB), pp. 195–202.