The Interrogator: Protocol Secuity Analysis
IEEE Transactions on Software Engineering - Special issue on computer security and privacy
ACM SIGOPS Operating Systems Review
Parallel program design: a foundation
Parallel program design: a foundation
ACM Transactions on Computer Systems (TOCS)
A semantics for a logic of authentication (extended abstract)
PODC '91 Proceedings of the tenth annual ACM symposium on Principles of distributed computing
Authentication in distributed systems: a bibliography
ACM SIGOPS Operating Systems Review
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
A key distribution protocol using event markers
ACM Transactions on Computer Systems (TOCS)
Timestamps in key distribution protocols
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Verification and Modelling of Authentication Protocols
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
VDM '91 Proceedings of the 4th International Symposium of VDM Europe on Formal Software Development-Volume 2: Tutorials
Roles in Cryptographic Protocols
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Model-Based Verification of a Security Protocol for Conditional Access to Services
Formal Methods in System Design
A compiler for analyzing cryptographic protocols using noninterference
ACM Transactions on Software Engineering and Methodology (TOSEM)
Validating firewalls using flow logics
Theoretical Computer Science
On the symbolic reduction of processes with cryptographic functions
Theoretical Computer Science
Flow logic for Dolev-Yao secrecy in cryptographic processes
Future Generation Computer Systems - Parallel computing technologies (PaCT-2001)
A bisimulation method for cryptographic protocols
Nordic Journal of Computing
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
A Method for Automatic Cryptographic Protocol Verification
IPDPS '00 Proceedings of the 15 IPDPS 2000 Workshops on Parallel and Distributed Processing
Static Analysis for Secrecy and Non-interference in Networks of Processes
PaCT '01 Proceedings of the 6th International Conference on Parallel Computing Technologies
Formal Verification of Secret Sharing Protocol Using Coq
ASIAN '99 Proceedings of the 5th Asian Computing Science Conference on Advances in Computing Science
A New Logic for Electronic Commerce Protocols
AMAST '00 Proceedings of the 8th International Conference on Algebraic Methodology and Software Technology
Proof Techniques for Cryptographic Protocols
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
Analyzing Cryptographic Protocols in a Reactive Framework
VMCAI '02 Revised Papers from the Third International Workshop on Verification, Model Checking, and Abstract Interpretation
On the Reachability Problem in Cryptographic Protocols
CONCUR '00 Proceedings of the 11th International Conference on Concurrency Theory
A Simple Sequent System for First-Order Logic with Free Constructors
TABLEAUX '99 Proceedings of the International Conference on Automated Reasoning with Analytic Tableaux and Related Methods
Automated Reasoning and the Verification of Security Protocols
TABLEAUX '99 Proceedings of the International Conference on Automated Reasoning with Analytic Tableaux and Related Methods
Making Sense of Specifications: The Formalization of SET
Revised Papers from the 8th International Workshop on Security Protocols
Types and Effects for Asymmetric Cryptographic Protocols
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Authenticity by Typing for Security Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Authenticity by typing for security protocols
Journal of Computer Security - Special issue on CSFW14
Static validation of security protocols
Journal of Computer Security
Information and Computation
Types and effects for asymmetric cryptographic protocols
Journal of Computer Security - Special issue on CSFW15
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Advanced method for cryptographic protocol verification
Journal of Computational Methods in Sciences and Engineering - Selected papers from the International Conference on Computer Science, Software Engineering, Information Technology, e-Business, and Applications, 2004
SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
Model Checking and Artificial Intelligence
Pattern-based abstraction for verifying secrecy in protocols
TACAS'03 Proceedings of the 9th international conference on Tools and algorithms for the construction and analysis of systems
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Finite models for formal security proofs
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
A correlation based detection system for keys reuse in SSH/SSL
AMERICAN-MATH'11/CEA'11 Proceedings of the 2011 American conference on applied mathematics and the 5th WSEAS international conference on Computer engineering and applications
Verification of security protocols using LOTOS-method and application
Computer Communications
Verifying Security Protocols Modelled by Networks of Automata
Fundamenta Informaticae - Special Issue on Concurrency Specification and Programming (CS&P)
Hi-index | 0.00 |