Using CSP to Detect Errors in the TMN Protocol
IEEE Transactions on Software Engineering
Verifying security protocols with Brutus
ACM Transactions on Software Engineering and Methodology (TOSEM)
Using SMV for cryptographic protocol analysis: a case study
ACM SIGOPS Operating Systems Review
Experimenting with STA, a tool for automatic analysis of security protocols
Proceedings of the 2002 ACM symposium on Applied computing
Domain partitioning for open reactive systems
ISSTA '02 Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis
Authentication tests and the structure of bundles
Theoretical Computer Science
Using SPIN to Verify Security Properties of Cryptographic Protocols
Proceedings of the 9th International SPIN Workshop on Model Checking of Software
Security Goals: Packet Trajectories and Strand Spaces
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Partial Order Reductions for Security Protocol Verification
TACAS '00 Proceedings of the 6th International Conference on Tools and Algorithms for Construction and Analysis of Systems: Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000
CVS at Work: A Report on New Failures upon Some Cryptographic Protocols
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
LOPSTR '01 Selected papers from the 11th International Workshop on Logic Based Program Synthesis and Transformation
An Improved Constraint-Based System for the Verification of Security Protocols
SAS '02 Proceedings of the 9th International Symposium on Static Analysis
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Formal Specification and Verification of Mobile Agent Data Integrity Properties: A Case Study
MA '01 Proceedings of the 5th International Conference on Mobile Agents
A Meta-Notation for Protocol Analysis
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
CVS: A Compiler for the Analysis of Cryptographic Protocols
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Formal Framework and Evaluation Method for Network Denial of Service
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
First-order verification of cryptographic protocols
Journal of Computer Security - CSFW13
Automatic testing equivalence verification of spi calculus specifications
ACM Transactions on Software Engineering and Methodology (TOSEM)
Using backward strategy to the Needham-Schroeder public key protocol verification
Artificial intelligence and security in computing systems
Timed model checking of security protocols
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Relating cryptography and formal methods: a panel
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Relating Symbolic and Cryptographic Secrecy
IEEE Transactions on Dependable and Secure Computing
Static validation of security protocols
Journal of Computer Security
Improving the security of industrial networks by means of formal verification
Computer Standards & Interfaces
Injective synchronisation: an extension of the authentication hierarchy
Theoretical Computer Science - Automated reasoning for security protocol analysis
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
A survey of algebraic properties used in cryptographic protocols
Journal of Computer Security
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Electronic Notes in Theoretical Computer Science (ENTCS)
On the protocol composition logic PCL
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Modeling and Verifying Time Sensitive Security Protocols with Constraints
Electronic Notes in Theoretical Computer Science (ENTCS)
Timed analysis of security protocols
Journal of Computer Security - Formal Methods in Security Engineering Workshop (FMSE 04)
Constraint Abstraction in Verification of Security Protocols
FAW '08 Proceedings of the 2nd annual international workshop on Frontiers in Algorithmics
Proceedings of the 15th ACM conference on Computer and communications security
Cryptographic Protocol Explication and End-Point Projection
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Safely composing security protocols
Formal Methods in System Design
Tools for cryptographic protocols analysis: A technical and experimental comparison
Computer Standards & Interfaces
Improving Automatic Verification of Security Protocols with XOR
ICFEM '09 Proceedings of the 11th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
A Syntactic Criterion for Injectivity of Authentication Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Extending Security Protocol Analysis: New Challenges
Electronic Notes in Theoretical Computer Science (ENTCS)
A Trace Logic for Local Security Properties
Electronic Notes in Theoretical Computer Science (ENTCS)
Compositionality of Security Protocols: A Research Agenda
Electronic Notes in Theoretical Computer Science (ENTCS)
An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Constraints solution for time sensitive security protocols
FAW'07 Proceedings of the 1st annual international conference on Frontiers in algorithmics
Calibrating the power of schedulers for probabilistic polynomial-time calculus
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Model checking detectability of attacks in multiagent systems
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1 - Volume 1
Component-oriented verification of noninterference
Journal of Systems Architecture: the EUROMICRO Journal
The modelling and analysis of ocean store elements using the CSP dependability library
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
${\mathcal PS}$-LTL for constraint-based security protocol analysis
ICLP'05 Proceedings of the 21st international conference on Logic Programming
Security and privacy analysis of RFID systems using model checking
HPCC'06 Proceedings of the Second international conference on High Performance Computing and Communications
Justifying a dolev-yao model under active attacks
Foundations of Security Analysis and Design III
Computationally sound, automated proofs for security protocols
ESOP'05 Proceedings of the 14th European conference on Programming Languages and Systems
Checking secrecy by means of partial order reduction
SAM'04 Proceedings of the 4th international SDL and MSC conference on System Analysis and Modeling
Automatic detection of attacks on cryptographic protocols: a case study
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Operational semantics of security protocols
SMTT'03 Proceedings of the 2003 international conference on Scenarios: models, Transformations and Tools
Application of model checking to AXML system's security: a case study
WS-FM'06 Proceedings of the Third international conference on Web Services and Formal Methods
Secure composition of protocols
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Intrusion attack tactics for the model checking of e-commerce security guarantees
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Quantitative security evaluation of a multi-biometric authentication system
SAFECOMP'12 Proceedings of the 2012 international conference on Computer Safety, Reliability, and Security
Security and performance evaluation of security protocols
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
Analysis of object-specific authorization protocol (OSAP) using coloured petri nets
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
Review: A survey of secure protocols in Mobile IPv6
Journal of Network and Computer Applications
Establishing and preserving protocol security goals
Journal of Computer Security - Foundational Aspects of Security
Hi-index | 0.00 |