Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Authenticity and Provability - A Formal Framework
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Multichannel Security Protocols
IEEE Pervasive Computing
Developing security protocols by refinement
Proceedings of the 17th ACM conference on Computer and communications security
AnBx: security protocols design and verification
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Analysing protocol stacks for services
Rigorous software engineering for service-oriented systems
Constructive cryptography --- a new paradigm for security definitions and proofs
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
A calculus for privacy-friendly authentication
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Establishing and preserving protocol security goals
Journal of Computer Security - Foundational Aspects of Security
Hi-index | 0.00 |