Symbolic Trace Analysis of Cryptographic Protocols
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Analysing a Stream Authentication Protocol Using Model Checking
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
A Framework for the Analysis of Security Protocols
CONCUR '02 Proceedings of the 13th International Conference on Concurrency Theory
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
Capturing Parallel Attacks within the Data Independence Framework
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
Automatic verification of the TLS handshake protocol
Proceedings of the 2004 ACM symposium on Applied computing
Proceedings of the 2005 ACM symposium on Applied computing
Embedding agents within the intruder to detect parallel attacks
Journal of Computer Security - Special issue on CSFW15
Bounded memory Dolev-Yao adversaries in collaborative systems
FAST'10 Proceedings of the 7th International conference on Formal aspects of security and trust
CSP-based counter abstraction for systems with node identifiers
Science of Computer Programming
Hi-index | 0.00 |