### Table 2. Proof System

2004

"... In PAGE 8: ... We now see that it also forms the basis of a sound and complete proof theory, and a decision procedure based on proof-search. The rules of the proof system are shown in Table2 . Since there is no Cut rule, the rules have a rather odd form.... ..."

Cited by 34

### Table 2. Proof System

2004

"... In PAGE 8: ... We now see that it also forms the basis of a sound and complete proof theory, and a decision procedure based on proof-search. The rules of the proof system are shown in Table2 . Since there is no Cut rule, the rules have a rather odd form.... ..."

Cited by 34

### Table 2. Proof System

2004

"... In PAGE 8: ... We now see that it also forms the basis of a sound and complete proof theory, and a decision procedure based on proof-search. The rules of the proof system are shown in Table2 . Since there is no Cut rule, the rules have a rather odd form.... ..."

Cited by 34

### Table 2. Proof System

2004

Cited by 34

### Table 2. Proof System

2004

Cited by 34

### Table 2. Proof System

2004

Cited by 34

### Table 1: Proofs of security for signature schemes Signature Proof model assumption tight/loose

2004

"... In PAGE 3: ... Our proof of security of the mNR signature provides support for the claims in [1], where this signature was introduced, but the provided analysis included incorrect arguments. Table1 includes signature schemes that have been proven secure in various settings, to facilitate a comparison with the mNR: Table 1: Proofs of security for signature schemes Signature Proof model assumption tight/loose... ..."

Cited by 4

### Table 1: Proofs of security for signature schemes Signature Proof model assumption tight/loose

"... In PAGE 3: ... Our proof of security of the mNR signature provides support for the claims in [1], where this signature was introduced, but the provided analysis included incorrect arguments. Table1 includes signature schemes that have been proven secure in various settings, to facilitate a comparison with the mNR: Table 1: Proofs of security for signature schemes Signature Proof model assumption tight/loose... ..."

### Table 6. PKINIT Security Properties

"... In PAGE 17: ... The proof of this theorem being very similar to the proof of theorem 8 is omitted from this paper. square Kerberos with PKINIT We prove theorems for Kerberos with PKINIT [22] that are analogous to theorems 7-10 and are listed in Table6 . The proofs are omitted due to space constraints.... ..."

### Table 7: The Proof System for process and tuple predicates

"... In PAGE 12: ...ppCV BP B4AZ ppB5 CJ B4B7 CUCU ppCVB5 CJ B4B4AZ ppB5 CM B4B7 CUCU ppCVB5B5 where: B4AZ pp1B5 CM B4AZ pp2B5 BP CUppBC CM ppBCBCCYppBC BEAZ pp1 and ppBCBC BEAZ pp2CV AZ ap BPB7 CUppCYpp BE apCV B4ap AXAZ ppB5 BP CUap AX ppBCCYppBC BEAZ ppCV AZ tp BPB7 CUppCYpp BE tpCV Let CUppCV be a set of process predicates, we use B4CUCU ppCVB5C for the CM-closure of CUppCV. The proof system for process and tuples predicates is defined in Table7 . Now we present soundness and completeness result for the proof system.... ..."