ACM Transactions on Computer Systems (TOCS)
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
Reaching Agreement in the Presence of Faults
Journal of the ACM (JACM)
Computer
Roles in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
A Semantic Model for Authentication Protocols
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Secrecy by typing in security protocols
Journal of the ACM (JACM)
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Some guidelines for non-repudiation protocols
ACM SIGCOMM Computer Communication Review
Authentication tests and the structure of bundles
Theoretical Computer Science
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
An Improved Constraint-Based System for the Verification of Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
CVS: A Compiler for the Analysis of Cryptographic Protocols
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Security Protocol Design via Authentication Tests
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Formal Automatic Verification of Authentication Cryptographic Protocols
ICFEM '97 Proceedings of the 1st International Conference on Formal Engineering Methods
How to prevent type flaw attacks on security protocols
Journal of Computer Security - CSFW13
Authenticity by tagging and typing
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Fast automatic synthesis of security protocols using backward search
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Decidability of context-explicit security protocols
Journal of Computer Security - Special issue on WITS'03
Preventing type flaw attacks on security protocols with a simplified tagging scheme
ISICT '04 Proceedings of the 2004 international symposium on Information and communication technologies
On the impossibility of building secure cliques-type authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW17
Understanding the intruder through attacks on cryptographic protocols
Proceedings of the 44th annual Southeast regional conference
Secrecy by interpretation functions
Knowledge-Based Systems
Authentication tests and disjoint encryption: A design method for security protocols
Journal of Computer Security - Special issue on CSFW15
A calculus of challenges and responses
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Detecting and Preventing Type flaws: a Control Flow Analysis with Tags
Electronic Notes in Theoretical Computer Science (ENTCS)
On the relationships between models in protocol verification
Information and Computation
Dynamic types for authentication
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis
CAV '08 Proceedings of the 20th international conference on Computer Aided Verification
Secrecy of cryptographic protocols under equational theory
Knowledge-Based Systems
Rewriting Techniques in the Constraint Solver
Electronic Notes in Theoretical Computer Science (ENTCS)
Journal of Systems Architecture: the EUROMICRO Journal
The ρ-spi Calculus at Work: Authentication Case Studies
Electronic Notes in Theoretical Computer Science (ENTCS)
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
Detecting and preventing type flaws at static time
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
An intuitionistic epistemic logic for sequential consistency on shared memory
LPAR'10 Proceedings of the 16th international conference on Logic for programming, artificial intelligence, and reasoning
Requirements for security protocols
TELE-INFO'06 Proceedings of the 5th WSEAS international conference on Telecommunications and informatics
Game semantics model for security protocols
ICFEM'05 Proceedings of the 7th international conference on Formal Methods and Software Engineering
Establishing and preserving protocol security goals
Journal of Computer Security - Foundational Aspects of Security
Hi-index | 0.00 |