Distributed Computing
Belief, awareness, and limited reasoning
Artificial Intelligence
Knowledge and common knowledge in a distributed environment
Journal of the ACM (JACM)
On the formal analysis of PKCS authentication protocols
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Towards a theory of knowledge and ignorance: preliminary report
Logics and models of concurrent systems
Security defects in CCITT recommendation X.509: the directory authentication framework
ACM SIGCOMM Computer Communication Review
A critique of the Burrows, Abadi and Needham logic
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
On key distribution protocols for repeated authentication
ACM SIGOPS Operating Systems Review
Optimality of multi-domain protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Adding time to a logic of authentication
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Extending cryptographic logics of belief to key agreement protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Optimal privacy and authentication on a portable communications system
ACM SIGOPS Operating Systems Review
An alternate explanation of two BAN-logic “failures”
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A Model for Secure Protocols and Their Compositions
IEEE Transactions on Software Engineering
A Formal Language for Cryptographic Protocol Requirements
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
ACM SIGOPS Operating Systems Review
Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
An authentication logic supporting synchronization, revocation, and recency
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
An approach to the formal verification of cryptographic protocols
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
On the properties of cryptographic protocols and the weaknesses of the BAN-like logics
ACM SIGOPS Operating Systems Review
An approach to the formal verification of the two-party cryptographic protocols
ACM SIGOPS Operating Systems Review
Dynamic analysis of security protocols
Proceedings of the 2000 workshop on New security paradigms
Verifying security protocols as planning in logic programming
ACM Transactions on Computational Logic (TOCL) - Special issue devoted to Robert A. Kowalski
An approach to finding the attacks on the cryptographic protocols
ACM SIGOPS Operating Systems Review
A logic for modeling the dynamics of beliefs in cryptographic protocols
ACSC '01 Proceedings of the 24th Australasian conference on Computer science
An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency
IEEE Transactions on Software Engineering
Analysis of security protocols as open systems
Theoretical Computer Science
A new logic for electronic commerce protocols
Theoretical Computer Science - Special issue: Algebraic methodology and software technology
Verification of Payment Protocols via MultiAgent Model Checking
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Model Checking-Based Analysis of Multiagent Systems
FAABS '00 Proceedings of the First International Workshop on Formal Approaches to Agent-Based Systems-Revised Papers
The Logic of Authentication Protocols
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Automatic Verification of Cryptographic Protocols through Compositional Analysis Techniques
TACAS '99 Proceedings of the 5th International Conference on Tools and Algorithms for Construction and Analysis of Systems
Model Checking Security Protocols Using a Logic of Belief
TACAS '00 Proceedings of the 6th International Conference on Tools and Algorithms for Construction and Analysis of Systems: Held as Part of the European Joint Conferences on the Theory and Practice of Software, ETAPS 2000
On BAN Logics for Industrial Security Protocols
CEEMAS '01 Revised Papers from the Second International Workshop of Central and Eastern Europe on Multi-Agent Systems: From Theory to Practice in Multi-Agent Systems
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Revised Papers from the 8th International Workshop on Security Protocols
Verification of the SSL/TLS Protocol Using a Model Checkable Logic of Belief and Time
SAFECOMP '02 Proceedings of the 21st International Conference on Computer Safety, Reliability and Security
Abstracting cryptographic protocols with tree automata
Science of Computer Programming - Special issue on static analysis (SAS'99)
A HOL extension of GNY for automatically analyzing cryptographic protocols
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
ENDL: A Logical Framework for Verifying Secure Transaction Protocols
Knowledge and Information Systems
ACM SIGACT News
Deciding knowledge properties of security protocols
TARK '05 Proceedings of the 10th conference on Theoretical aspects of rationality and knowledge
Static validation of security protocols
Journal of Computer Security
Century papers at the first quarter-century milestone
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
A complete and decidable security-specialised logic and its application to the TESLA protocol
AAMAS '06 Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
A (restricted) quantifier elimination for security protocols
Theoretical Computer Science - Automated reasoning for security protocol analysis
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Temporal Logics of Knowledge and their Applications in Security
Electronic Notes in Theoretical Computer Science (ENTCS)
The reactive simulatability (RSIM) framework for asynchronous systems
Information and Computation
Perfect cryptography, S5 knowledge, and algorithmic knowledge
TARK '07 Proceedings of the 11th conference on Theoretical aspects of rationality and knowledge
On BAN logic and hash functions or: how an unjustified inference rule causes problems
Autonomous Agents and Multi-Agent Systems
Verification of authentication protocols for epistemic goals via SAT compilation
Journal of Computer Science and Technology
Theories of Trust for Communication Protocols
ATC '09 Proceedings of the 6th International Conference on Autonomic and Trusted Computing
An Approach for the Design of Secure Communication in Embedded Systems
Proceedings of the Symposium on Human Interface 2009 on ConferenceUniversal Access in Human-Computer Interaction. Part I: Held as Part of HCI International 2009
Belief change and cryptographic protocol verification
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 1
Variable forgetting in reasoning about knowledge
Journal of Artificial Intelligence Research
On a formal framework for security properties
Computer Standards & Interfaces
Analysis of authentication protocols in agent-based systems using labeled tableaux
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on cybernetics and cognitive informatics
Toward Reasoning about Security Protocols: A Semantic Approach
Electronic Notes in Theoretical Computer Science (ENTCS)
Extending Security Protocol Analysis: New Challenges
Electronic Notes in Theoretical Computer Science (ENTCS)
Synthesising Efficient and Effective Security Protocols
Electronic Notes in Theoretical Computer Science (ENTCS)
Looking at a class of RFID APs through GNY logic
International Journal of Security and Networks
A logic-based verification framework for authentication protocols
International Journal of Internet Technology and Secured Transactions
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
L-PEP: a logic to reason about privacy-enhancing cryptography protocols
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
On the (im)possibility of perennial message recognition protocols without public-key cryptography
Proceedings of the 2011 ACM Symposium on Applied Computing
Authentication mechanism using one-time password for 802.11 wireless LAN
CSR'06 Proceedings of the First international computer science conference on Theory and Applications
Investigating authentication mechanisms for wireless mobile network
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Generic verification of security protocols
SPIN'05 Proceedings of the 12th international conference on Model Checking Software
Abstractions preserving parameter confidentiality
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Model driven security analysis of IDaaS protocols
ICSOC'11 Proceedings of the 9th international conference on Service-Oriented Computing
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
On a framework for energy-efficient security protocols in wireless networks
Computer Communications
Temporal accountability and anonymity in medical sensor networks
Mobile Networks and Applications - Special issue on Wireless and Personal Communications
A belief logic for analyzing security of web protocols
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
A Quantifier-free First-order Knowledge Logic of Authentication
Fundamenta Informaticae - SPECIAL ISSUE ON CONCURRENCY SPECIFICATION AND PROGRAMMING (CS&P 2005) Ruciane-Nide, Poland, 28-30 September 2005
Managing trust and secrecy in identity management clouds
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Using automated model analysis for reasoning about security of web protocols
Proceedings of the 28th Annual Computer Security Applications Conference
Secure communication mechanism for ubiquitous Smart grid infrastructure
The Journal of Supercomputing
Analysis of mobile authentication protocols by SVO logic
Proceedings of the First International Conference on Security of Internet of Things
Hi-index | 0.00 |