Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
Formalizing GDOI group key management requirements in NPATRL
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
The verification of an industrial payment protocol: the SET purchase phase
Proceedings of the 9th ACM conference on Computer and communications security
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Practical Reasoning about Accountability in Electronic Commerce Protocols
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A Top-Down Look at a Secure Message
Proceedings of the 19th Conference on Foundations of Software Technology and Theoretical Computer Science
Non-repudiation in SET: Open Issues
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
Automatic verification of security in payment protocols for electronic commerce
Enterprise information systems IV
Science of Computer Programming - Special issue on 12th European symposium on programming (ESOP 2003)
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
A flaw in the electronic commerce protocol SET
Information Processing Letters
Trusting trusted hardware: towards a formal model for programmable secure coprocessors
WOEC'98 Proceedings of the 3rd conference on USENIX Workshop on Electronic Commerce - Volume 3
IEEE Transactions on Dependable and Secure Computing
A flaw in the electronic commerce protocol SET
Information Processing Letters
Formal analysis of the iKP electronic payment protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
ESOP'03 Proceedings of the 12th European conference on Programming
Verifying the purchase request in SET protocol
APWeb'03 Proceedings of the 5th Asia-Pacific web conference on Web technologies and applications
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
L-PEP: a logic to reason about privacy-enhancing cryptography protocols
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Speculations on the science of web user security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |