Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
Formal analysis of PIN block attacks
Theoretical Computer Science - Automated reasoning for security protocol analysis
Secrecy by interpretation functions
Knowledge-Based Systems
Slede: a domain-specific verification framework for sensor network security protocol implementations
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Analysis of authentication protocols in agent-based systems using labeled tableaux
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on cybernetics and cognitive informatics
Extending Security Protocol Analysis: New Challenges
Electronic Notes in Theoretical Computer Science (ENTCS)
Integrity of intention (a theory of types for security APIs)
Information Security Tech. Report
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Type-based analysis of PIN processing APIs
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A generic security API for symmetric key management on cryptographic devices
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Attacking and fixing PKCS#11 security tokens
Proceedings of the 17th ACM conference on Computer and communications security
Formal security analysis of PKCS#11 and proprietary extensions
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Information Security Tech. Report
An introduction to security API analysis
Foundations of security analysis and design VI
Deduction with XOR constraints in security API modelling
CADE' 20 Proceedings of the 20th international conference on Automated Deduction
A novel common control channel security framework for cognitive radio networks
International Journal of Autonomous and Adaptive Communications Systems
Detecting flaws in dynamic hierarchical key management schemes using specification animation
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Type-Based analysis of PKCS#11 key management
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Proceedings of the 2012 ACM conference on Computer and communications security
Type-based analysis of key management in PKCS#11 cryptographic devices
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |