Model-Based Verification of a Security Protocol for Conditional Access to Services
Formal Methods in System Design
Finite-state analysis of two contract signing protocols
Theoretical Computer Science
WADT '01 Selected papers from the 15th International Workshop on Recent Trends in Algebraic Development Techniques
Proof Techniques for Cryptographic Protocols
ICAL '99 Proceedings of the 26th International Colloquium on Automata, Languages and Programming
Specification of a Smart Card Operating System
TYPES '99 Selected papers from the International Workshop on Types for Proofs and Programs
An Introduction to Dependent Type Theory
Applied Semantics, International Summer School, APPSEM 2000, Caminha, Portugal, September 9-15, 2000, Advanced Lectures
Analysis of Abuse-Free Contract Signing
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
Reasoning about confidentiality at requirements engineering time
Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering
RTA'03 Proceedings of the 14th international conference on Rewriting techniques and applications
Security protocols: principles and calculi tutorial notes
Foundations of security analysis and design IV
On Using B in the Design of Secure Micro-controllers: An Experience Report
Electronic Notes in Theoretical Computer Science (ENTCS)
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Hi-index | 0.00 |