Model-Based Verification of a Security Protocol for Conditional Access to Services
Formal Methods in System Design
An environment for security protocol intrusion detection
Journal of Computer Security
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
Planning Attacks to Security Protocols: Case Studies in Logic Programming
Computational Logic: Logic Programming and Beyond, Essays in Honour of Robert A. Kowalski, Part I
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
LOPSTR '01 Selected papers from the 11th International Workshop on Logic Based Program Synthesis and Transformation
Automated Reasoning and the Verification of Security Protocols
TABLEAUX '99 Proceedings of the International Conference on Automated Reasoning with Analytic Tableaux and Related Methods
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm
WET-ICE '97 Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
An Improved Constraint-Based System for the Verification of Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Making Sense of Specifications: The Formalization of SET
Revised Papers from the 8th International Workshop on Security Protocols
Automated Analysis of Some Security Mechanisms of SCEP
ISC '02 Proceedings of the 5th International Conference on Information Security
FME '01 Proceedings of the International Symposium of Formal Methods Europe on Formal Methods for Increasing Software Productivity
PIL/SETHEO: A Tool for the Automatic Analysis of Authentication Protocols
CAV '99 Proceedings of the 11th International Conference on Computer Aided Verification
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
Athena: a New Efficient Automatic Checker for Security Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Formal Automatic Verification of Authentication Cryptographic Protocols
ICFEM '97 Proceedings of the 1st International Conference on Formal Engineering Methods
Computing Symbolic Models for Verifying Cryptographic Protocols
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Logical relation for encryption
Journal of Computer Security - Special issue on CSFW14
Stepwise development of security protocols: a speech act-oriented approach
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
New semantic model for authentication protocols in ASMs
Journal of Computer Science and Technology
Tailoring the Dolev-Yao abstraction to web services realities
Proceedings of the 2005 workshop on Secure web services
Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN
Nordic Journal of Computing
Simulation Based Validation Of Authentication Protocols
Journal of Integrated Design & Process Science
Slede: a domain-specific verification framework for sensor network security protocol implementations
WiSec '08 Proceedings of the first ACM conference on Wireless network security
An integrated framework for security protocol analysis
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Unguessable Atoms: A Logical Foundation for Security
VSTTE '08 Proceedings of the 2nd international conference on Verified Software: Theories, Tools, Experiments
Developing high-assurance secure systems with UML: a smartcard-based purchase protocol
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
Efficient general unification for XOR with homomorphism
CADE'11 Proceedings of the 23rd international conference on Automated deduction
On the security of the canetti-krawczyk model
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
A formal security analysis of an OSA/Parlay authentication interface
FMOODS'05 Proceedings of the 7th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems
FORTE'05 Proceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
A novel common control channel security framework for cognitive radio networks
International Journal of Autonomous and Adaptive Communications Systems
Anonymous channel and authentication in wireless communications
Computer Communications
Key establishment protocols for secure mobile communications: a critical survey
Computer Communications
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Hi-index | 0.00 |