Inductive analysis of the Internet protocol TLS
ACM Transactions on Information and System Security (TISSEC)
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
The verification of an industrial payment protocol: the SET purchase phase
Proceedings of the 9th ACM conference on Computer and communications security
Soft Constraints for Security Protocol Analysis: Confidentiality
PADL '01 Proceedings of the Third International Symposium on Practical Aspects of Declarative Languages
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
Mechanical Proofs about a Non-repudiation Protocol
TPHOLs '01 Proceedings of the 14th International Conference on Theorem Proving in Higher Order Logics
Mechanising a Protocol for Smart Cards
E-SMART '01 Proceedings of the International Conference on Research in Smart Cards: Smart Card Programming and Security
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
LOPSTR '01 Selected papers from the 11th International Workshop on Logic Based Program Synthesis and Transformation
Automated Reasoning and the Verification of Security Protocols
TABLEAUX '99 Proceedings of the International Conference on Automated Reasoning with Analytic Tableaux and Related Methods
An Improved Constraint-Based System for the Verification of Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Making Sense of Specifications: The Formalization of SET
Revised Papers from the 8th International Workshop on Security Protocols
Revised Papers from the 9th International Workshop on Security Protocols
SET Cardholder Registration: The Secrecy Proofs
IJCAR '01 Proceedings of the First International Joint Conference on Automated Reasoning
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
Inductive verification of smart card protocols
Journal of Computer Security
A Formal Analysis of Some Properties of Kerberos 5 Using MSR
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
First-order verification of cryptographic protocols
Journal of Computer Security - CSFW13
Soft constraint programming to analysing security protocols
Theory and Practice of Logic Programming
Timed model checking of security protocols
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Specifying Kerberos 5 cross-realm authentication
WITS '05 Proceedings of the 2005 workshop on Issues in the theory of security
Specification and formal verification of security requirements
CompSysTech '04 Proceedings of the 5th international conference on Computer systems and technologies
Computer-assisted verification of a protocol for certified email
Science of Computer Programming - Special issue: Static analysis symposium (SAS 2003)
Theoretical Computer Science - Automated reasoning for security protocol analysis
Protocol Composition Logic (PCL)
Electronic Notes in Theoretical Computer Science (ENTCS)
Computationally sound mechanized proofs for basic and public-key Kerberos
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Timed analysis of security protocols
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Computer-assisted verification of a protocol for certified email
SAS'03 Proceedings of the 10th international conference on Static analysis
Secrecy analysis in protocol composition logic
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
Analysis of EAP-GPSK authentication protocol
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Formal proofs of cryptographic security of Diffie-Hellman-based protocols
TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
Inductive trace properties for computational security
Journal of Computer Security - 7th International Workshop on Issues in the Theory of Security (WITS'07)
Petri nets-based models for basic authentication procedure
COMATIA'10 Proceedings of the 2010 international conference on Communication and management in technological innovation and academic globalization
Is the verification problem for cryptographic protocols solved?
Proceedings of the 11th international conference on Security Protocols
SeVe: automatic tool for verification of security protocols
Frontiers of Computer Science in China
Cryptographically sound security proofs for basic and public-key kerberos
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Formal privacy analysis of communication protocols for identity management
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic
LICS '13 Proceedings of the 2013 28th Annual ACM/IEEE Symposium on Logic in Computer Science
Efficient construction of machine-checked symbolic protocol security proofs
Journal of Computer Security
Hi-index | 0.00 |