Informatics Report Series


Graham Steel

Related Pages

Report (by Number) Index
Report (by Date) Index
Author Index
Institute Index

Report Date Title
EDI-INF-RR-1004 Jul 2007 A Formal Theory of Key Conjuring
EDI-INF-RR-0863 Sep 2006 Automatic Analysis of the Security of XOR-based Key Management Schemes
EDI-INF-RR-0827 Nov 2006 Formal Analysis of PIN Block Attacks
EDI-INF-RR-0270 2004 Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
EDI-INF-RR-0269 2004 Attacking Group Multicast Key Management Protocols Using CORAL
EDI-INF-RR-0268 Jan 2006 Attacking Group Protocols by Refuting Incorrect Inductive Conjectures
EDI-INF-RR-0267 Jul 2005 Deduction with XOR Constraints in Security API Modelling
EDI-INF-RR-0260 Aug 1999 Artificial Intelligence and Scientific Creativity
EDI-INF-RR-0179 Oct 2003 Attacking the Asokan--Ginzboorg Protocol for Key Distribution in an Ad-Hoc Bluetooth Network Using CORAL
EDI-INF-RR-0141 Jul 2002 Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks
EDI-INF-RR-0019 May 2000 Cross Domain Mathematical Concept Formation

Home : Publications : Author 

Please mail <> with any changes or corrections.
Unless explicitly stated otherwise, all material is copyright The University of Edinburgh