Proving Secrecy is Easy Enough
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
A composable cryptographic library with nested operations
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 2003 workshop on New security paradigms
Temporal Logics of Knowledge and their Applications in Security
Electronic Notes in Theoretical Computer Science (ENTCS)
Automated refinement checking of concurrent systems
Proceedings of the 2007 IEEE/ACM international conference on Computer-aided design
PVS Embedding of cCSP Semantic Models and Their Relationship
Electronic Notes in Theoretical Computer Science (ENTCS)
The Stable Revivals Model in CSP-Prover
Electronic Notes in Theoretical Computer Science (ENTCS)
Linking Semantic Models to Support CSP () B Consistency Checking
Electronic Notes in Theoretical Computer Science (ENTCS)
Formalization and verification of a mail server in Coq
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Translating FSP into LOTOS and networks of automata
IFM'07 Proceedings of the 6th international conference on Integrated formal methods
Translation validation of high-level synthesis
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Encoding circus programs in ProofPower-Z
UTP'08 Proceedings of the 2nd international conference on Unifying theories of programming
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
A generic theorem prover of CSP refinement
TACAS'05 Proceedings of the 11th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Browser model for security analysis of browser-based protocols
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
A complete axiomatic semantics for the CSP stable-failures model
CONCUR'06 Proceedings of the 17th international conference on Concurrency Theory
Hi-index | 0.00 |