An approach to the formal verification of cryptographic protocols
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Verifying Authentication Protocols in CSP
IEEE Transactions on Software Engineering
Fixing a problem in the Helsinki protocol
ACM SIGOPS Operating Systems Review
Model-Based Verification of a Security Protocol for Conditional Access to Services
Formal Methods in System Design
Paradigm shifts in protocol analysis
Proceedings of the 1999 workshop on New security paradigms
Dynamic analysis of security protocols
Proceedings of the 2000 workshop on New security paradigms
Using SMV for cryptographic protocol analysis: a case study
ACM SIGOPS Operating Systems Review
Authentication tests and the structure of bundles
Theoretical Computer Science
An attack-finding algorithm for security protocols
Journal of Computer Science and Technology
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
Specifying Authentication Protocols Using Rewriting and Strategies
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Soft Constraints for Security Protocol Analysis: Confidentiality
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
A New Logic for Electronic Commerce Protocols
AMAST '00 Proceedings of the 8th International Conference on Algebraic Methodology and Software Technology
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
An Intelligent Intruder Model for Security Protocol Analysis
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Exploring Very Large State Spaces Using Genetic Algorithms
TACAS '02 Proceedings of the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems
Formal Verification of the Horn-Preneel Micropayment Protocol
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
A Logical Encoding of the pi-Calculus: Model Checking Mobile Processes Using Tabled Resolution
VMCAI 2003 Proceedings of the 4th International Conference on Verification, Model Checking, and Abstract Interpretation
Insider Fraud (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Lack of Explicitness Strikes Back
Revised Papers from the 8th International Workshop on Security Protocols
Interference Analysis for Dependable Systems Using Refinement and Abstraction
FME '02 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods - Getting IT Right
Verifying authentication protocol implementations
FMOODS '02 Proceedings of the IFIP TC6/WG6.1 Fifth International Conference on Formal Methods for Open Object-Based Distributed Systems V
Language generation and verification in the NRL protocol analyzer
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Some new attacks upon security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Intensional specifications of security protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Strand Spaces and Rank Functions: More than Distant Cousins
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Game Analysis of Abuse-free Contract Signing
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Flaw and modification of the iKP electronic payment protocols
Information Processing Letters
A game-based verification of non-repudiation and fair exchange protocols
Journal of Computer Security - IFIP 2000
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
Logical relation for encryption
Journal of Computer Security - Special issue on CSFW14
A compositional logic for proving security properties of protocols
Journal of Computer Security - Special issue on CSFW14
A bisimulation for dynamic sealing
Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Using backward strategy to the Needham-Schroeder public key protocol verification
Artificial intelligence and security in computing systems
Soft constraint programming to analysing security protocols
Theory and Practice of Logic Programming
Timed model checking of security protocols
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Stepwise development of security protocols: a speech act-oriented approach
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
New semantic model for authentication protocols in ASMs
Journal of Computer Science and Technology
Using static analysis to validate the SAML single sign-on protocol
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Formal prototyping in early stages of protocol design
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
DART: directed automated random testing
Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation
A decision procedure for the existence of a rank function
Journal of Computer Security
An NP decision procedure for protocol insecurity with XOR
Theoretical Computer Science
Proving a WS-federation passive requestor profile with a browser model
Proceedings of the 2005 workshop on Secure web services
Static validation of security protocols
Journal of Computer Security
A derivation system and compositional logic for security protocols
Journal of Computer Security
A computational analysis of the Needham-Schroeder-(Lowe) protocol
Journal of Computer Security
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Intruder deduction for the equational theory of Abelian groups with distributive encryption
Information and Computation
A bisimulation for dynamic sealing
Theoretical Computer Science
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
A Method for Patching Interleaving-Replay Attacks in Faulty Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions
Electronic Notes in Theoretical Computer Science (ENTCS)
Simulation Based Validation Of Authentication Protocols
Journal of Integrated Design & Process Science
Transducer-based analysis of cryptographic protocols
Information and Computation
Cryptographic logical relations
Theoretical Computer Science
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Timed analysis of security protocols
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Advanced method for cryptographic protocol verification
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
PETRI NETS '08 Proceedings of the 29th international conference on Applications and Theory of Petri Nets
Challenges in the Automated Verification of Security Protocols
IJCAR '08 Proceedings of the 4th international joint conference on Automated Reasoning
Partial Evaluation of PEPA Models for Fluid-Flow Analysis
EPEW '08 Proceedings of the 5th European Performance Engineering Workshop on Computer Performance Engineering
An Open Framework for Remote Electronic Elections
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Theoretical Computer Science
Determining a parallel session attack on a key distribution protocol using a model checker
Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
ICLP '09 Proceedings of the 25th International Conference on Logic Programming
Weakening the Dolev-Yao model through probability
Proceedings of the 2nd international conference on Security of information and networks
Knowledge based approach for mechanically verifying security protocols
IJCAI'05 Proceedings of the 19th international joint conference on Artificial intelligence
Random Test Run Length and Effectiveness
ASE '08 Proceedings of the 2008 23rd IEEE/ACM International Conference on Automated Software Engineering
Teaching Formal Methods Based on Rewriting Logic and Maude
TFM '09 Proceedings of the 2nd International Conference on Teaching Formal Methods
Enhancing of a Password-Based Authentication Scheme Using Smart Cards
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II
Verifying Anonymous Credential Systems in Applied Pi Calculus
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Satisfiability of Dolev-Yao Constraints
Electronic Notes in Theoretical Computer Science (ENTCS)
Rule-based Programming in Java For Protocol Verification
Electronic Notes in Theoretical Computer Science (ENTCS)
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
Electronic Notes in Theoretical Computer Science (ENTCS)
A logical verification method for security protocols based on linear logic and BAN logic
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Pattern-based abstraction for verifying secrecy in protocols
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
Formal modeling and analysis of the OGDC wireless sensor network algorithm in real-time maude
FMOODS'07 Proceedings of the 9th IFIP WG 6.1 international conference on Formal methods for open object-based distributed systems
Is your security protocol on time?
FSEN'07 Proceedings of the 2007 international conference on Fundamentals of software engineering
Vulnerabilities in a remote agent authentication scheme using smart cards
KES-AMSTA'08 Proceedings of the 2nd KES International conference on Agent and multi-agent systems: technologies and applications
Verification of integrity and secrecy properties of a biometric authentication protocol
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Cryptographic protocol verification using tractable classes of horn clauses
Program analysis and compilation, theory and practice
Model checking detectability of attacks in multiagent systems
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Finite models for formal security proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Some encounters on the productive use of a failed proof attempt or a counterexample
MICAI'10 Proceedings of the 9th Mexican international conference on Advances in artificial intelligence: Part I
A combination of forward and backward reachability analysis methods
ICFEM'10 Proceedings of the 12th international conference on Formal engineering methods and software engineering
Graphical Calculus for Quantum Key Distribution (Extended Abstract)
Electronic Notes in Theoretical Computer Science (ENTCS)
Programming cryptographic protocols
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Security'08 Proceedings of the 16th International conference on Security protocols
Analysis of authentication protocols with Scyter: case study
HI'11 Proceedings of the 2011 international conference on Human interface and the management of information - Volume Part I
Composition theorems without pre-established session identifiers
Proceedings of the 18th ACM conference on Computer and communications security
Extracting and verifying cryptographic models from C protocol code by symbolic execution
Proceedings of the 18th ACM conference on Computer and communications security
Enforcing S&D pattern design in RCES with modeling and formal approaches
Proceedings of the 14th international conference on Model driven engineering languages and systems
A protocol's life after attacks...
Proceedings of the 11th international conference on Security Protocols
From security protocols to systems security
Proceedings of the 11th international conference on Security Protocols
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Specifying authentication using signal events in CSP
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Two efficient and secure authentication schemes using smart cards
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part V
Cryptographic protocol analysis on real c code
VMCAI'05 Proceedings of the 6th international conference on Verification, Model Checking, and Abstract Interpretation
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
TACAS'05 Proceedings of the 11th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Completing the picture: soundness of formal encryption in the presence of active adversaries
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
Analysis of an electronic voting protocol in the applied pi calculus
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
Security enhancement of a remote user authentication scheme using smart cards
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Deduction with XOR constraints in security API modelling
CADE' 20 Proceedings of the 20th international conference on Automated Deduction
Intruder deduction for AC-like equational theories with homomorphisms
RTA'05 Proceedings of the 16th international conference on Term Rewriting and Applications
Browser model for security analysis of browser-based protocols
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Attacking and improving on lee and chiu’s authentication scheme using smart cards
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
FMOODS'10/FORTE'10 Proceedings of the 12th IFIP WG 6.1 international conference and 30th IFIP WG 6.1 international conference on Formal Techniques for Distributed Systems
Analyzing security protocols in hierarchical networks
ATVA'06 Proceedings of the 4th international conference on Automated Technology for Verification and Analysis
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Verifying security protocols: an application of CSP
CSP'04 Proceedings of the 2004 international conference on Communicating Sequential Processes: the First 25 Years
A game based model of security for key predistribution schemes in wireless sensor network
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Failures in a hybrid content blocking system
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Universally composable symbolic analysis of mutual authentication and key-exchange protocols
TCC'06 Proceedings of the Third conference on Theory of Cryptography
SAT-solving in CSP trace refinement
Science of Computer Programming
Privacy supporting cloud computing: confichair, a case study
POST'12 Proceedings of the First international conference on Principles of Security and Trust
The PASSERINE public key encryption and authentication mechanism
NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
Is cryptyc able to detect insider attacks?
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Modelling and Checking Timed Authentication of Security Protocols
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Provably secure certificateless one-way and two-party authenticated key agreement protocol
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
Analysis of object-specific authorization protocol (OSAP) using coloured petri nets
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
Proceedings of the 2013 ACM workshop on Digital identity management
Authenticated key agreement in wireless networks with automated key management
Proceedings of the 6th International Conference on Security of Information and Networks
CSP-based counter abstraction for systems with node identifiers
Science of Computer Programming
Secure embedded system hardware design - A flexible security and trust enhanced approach
Computers and Electrical Engineering
Privacy-supporting cloud computing by in-browser key translation
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.90 |