Authentication protocols for computer networks: I
Computer Networks and ISDN Systems
Efficient and timely mutual authentication
ACM SIGOPS Operating Systems Review
Verification of network security protocols
Computers and Security
ACM Transactions on Computer Systems (TOCS)
A security scheme for resource sharing over a network
Computers and Security
Design and validation of computer protocols
Design and validation of computer protocols
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
A security risk of depending on synchronized clocks
ACM SIGOPS Operating Systems Review
Two views of belief: belief as generalized probability and belief as evidence
Artificial Intelligence
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
Tractable reasoning via approximation
Artificial Intelligence
Secure communication using remote procedure calls
ACM Transactions on Computer Systems (TOCS)
Integration of weighted knowledge bases
Artificial Intelligence
An approach to the formal verification of cryptographic protocols
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Formal methods: state of the art and future directions
ACM Computing Surveys (CSUR) - Special ACM 50th-anniversary issue: strategic directions in computing research
Atomicity in electronic commerce
PODC '96 Proceedings of the fifteenth annual ACM symposium on Principles of distributed computing
IEEE Transactions on Software Engineering - Special issue on formal methods in software practice
A case study in model checking software systems
Science of Computer Programming - Special issue: on formal specifications: foundations, methods, tools and applications: selected papers from the FMTA '95 conference (29–31 May 1995, Konstancin n. Warsaw, Poland)
A Machine-Oriented Logic Based on the Resolution Principle
Journal of the ACM (JACM)
Secrecy by typing in security protocols
Journal of the ACM (JACM)
Mining frequent patterns without candidate generation
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Enhancing privacy and trust in electronic communities
Proceedings of the 1st ACM conference on Electronic commerce
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Timestamps in key distribution protocols
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
Security & Privacy for E-Business
Security & Privacy for E-Business
TCP/IP Applications and Protocols
TCP/IP Applications and Protocols
PROLOG Programming for Artificial Intelligence
PROLOG Programming for Artificial Intelligence
Network Security: A Beginner's Guide
Network Security: A Beginner's Guide
Protocols for Secure Electronic Commerce
Protocols for Secure Electronic Commerce
Arbitration (or How to Merge Knowledge Bases)
IEEE Transactions on Knowledge and Data Engineering
Using SPIN to Verify Security Properties of Cryptographic Protocols
Proceedings of the 9th International SPIN Workshop on Model Checking of Software
Exploiting Automatic Analysis of E-Commerce Protocols
COMPSAC '01 Proceedings of the 25th International Computer Software and Applications Conference on Invigorating Software Development
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Sound Logic for Analysing Electronic Commerce Protocols
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Formal Verification of Cardholder Registration in SET
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
A Formal Specification of Requirements for Payment Transactions in the SET Protocol
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Fingerprinting Concatenated Codes with Efficient Identification
ISC '02 Proceedings of the 5th International Conference on Information Security
Measuring inconsistency in knowledge via quasi-classical models
Eighteenth national conference on Artificial intelligence
A HOL extension of GNY for automatically analyzing cryptographic protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Language generation and verification in the NRL protocol analyzer
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Casper: A Compiler for the Analysis of Security Protocols
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Verifying authentication protocols with CSP
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Mechanized proofs for a recursive authentication protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Proving Properties of Security Protocols by Induction
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Towards the Formal Verification of Electronic Commerce Protocols
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Evaluating and Improving Protocol Analysis by Automatic Proof
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Honest Ideals on Strand Spaces
CSFW '98 Proceedings of the 11th IEEE workshop on Computer Security Foundations
Model Checking the Secure Electronic Transaction (SET) Protocol
MASCOTS '99 Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Verifiable Secret Redistribution for Archive Systems
SISW '02 Proceedings of the First International IEEE Security in Storage Workshop
An Interface Specification Language For Automatically Analyzing Cryptographic Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Formal Analysis of E-Commerce Protocols
ISADS '01 Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems
Protocols for Key Establishment and Authentication
Protocols for Key Establishment and Authentication
Restrictive blinding of secret-key certificates
Restrictive blinding of secret-key certificates
A Logical Language for Specifying Cryptographic Protocol Requirements
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
A Semantic Model for Authentication Protocols
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
On Unifying Some Cryptographic Protocol Logics
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Reasoning about accountability in protocols for electronic commerce
SP '95 Proceedings of the 1995 IEEE Symposium on Security and Privacy
Failure Analysis of an E-Commerce Protocol Using Model Checking
WECWIS '00 Proceedings of the Second International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems (WECWIS 2000)
Practical Asymmetric Fingerprinting with a TTP
DEXA '03 Proceedings of the 14th International Workshop on Database and Expert Systems Applications
Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction
Mining Frequent Itemsets without Support Threshold: With and without Item Constraints
IEEE Transactions on Knowledge and Data Engineering
Formal Analysis of an Anonymous Fair Exchange E-Commerce Protocol
CIT '04 Proceedings of the The Fourth International Conference on Computer and Information Technology
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
Low-Cost Traffic Analysis of Tor
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
A Framework for Merging Inconsistent Beliefs in Security Protocol Analysis
DEEC '05 Proceedings of the International Workshop on Data Engineering Issues in E-Commerce
Privacy preserving Data Mining Algorithms without the use of Secure Computation or Perturbation
IDEAS '06 Proceedings of the 10th International Database Engineering and Applications Symposium
Learning Bayesian Networks
Timing analysis of keystrokes and timing attacks on SSH
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Agora: a minimal distributed protocol for electronic commerce
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Uncertainty, belief, and probability
IJCAI'89 Proceedings of the 11th international joint conference on Artificial intelligence - Volume 2
Evaluating significance of inconsistencies
IJCAI'03 Proceedings of the 18th international joint conference on Artificial intelligence
Knowledge based approach for mechanically verifying security protocols
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
Hi-index | 0.00 |