Formal Analysis of the Genetic Toggle
CMSB '09 Proceedings of the 7th International Conference on Computational Methods in Systems Biology
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
Multi-Attacker Protocol Validation
Journal of Automated Reasoning
Dealing with inconsistent secure messages by weighting majority
Knowledge-Based Systems
Security protocol deployment risk
Security'08 Proceedings of the 16th International conference on Security protocols
Integrating automated and interactive protocol verification
FAST'09 Proceedings of the 6th international conference on Formal Aspects in Security and Trust
Towards verifying voter privacy through unlinkability
ESSoS'13 Proceedings of the 5th international conference on Engineering Secure Software and Systems
Verifying multicast-based security protocols using the inductive method
Proceedings of the 28th Annual ACM Symposium on Applied Computing
An updated threat model for security ceremonies
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Efficient construction of machine-checked symbolic protocol security proofs
Journal of Computer Security
Hi-index | 0.00 |