The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Avispa with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2008 (17) 2009-2013 (15) 2014-2022 (10)
Publication types (Num. hits)
article(7) inproceedings(35)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 29 occurrences of 25 keywords

Results
Found 42 publication records. Showing 42 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
98Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos Formal Validation of OFEPSP+ with AVISPA. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AVISPA, security protocol, Fair exchange, SPAN, formal validation
69Antonio Muñoz 0001, Antonio Maña, Daniel Serrano AVISPA in the Validation of Ambient Intelligence Scenarios. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
68Francis Klay, Laurent Vigneron Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AVISPA Tool, authentication, fairness, Cryptographic protocols, non-repudiation, automatic analysis
50Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò 0001, Laurent Vigneron The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. Search on Bibsonomy CAV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Llanos Tobarra, Diego Cazorla, Fernando Cuartero, Gregorio Díaz 0001, María-Emilia Cambronero Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AVISPA toolbox, Model checking, Security protocols, Wireless sensor
40Cas J. F. Cremers The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Sangeetha Rajaram, Satyanarayana Vollala, Ramasubramanian Natarajan ERMAP: ECC-based robust mutual authentication protocol for smart grid communication with AVISPA simulations. Search on Bibsonomy Int. J. Ad Hoc Ubiquitous Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Tomás Rabas, Róbert Lórencz, Jirí Bucek Verification of PUF-based IoT Protocols with AVISPA and Scyther. Search on Bibsonomy SECRYPT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Houssem Eddine Mohamadi, Nadjia Kara, Mohand Lagha Formal Verification of RGR-SEC, a Secured RGR Routing for UAANETs Using AVISPA, Scyther and Tamarin. Search on Bibsonomy FNSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Iulian Aciobanitei, Roxana-Ioana Guinea, Mihai-Lica Pura AVISPA versus AVANTSSAR in the Model Checking of Secure Communication Protocols. Search on Bibsonomy ICETE (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Varun Garg, Anish Mathuria On Automated Detection of Multi-Protocol Attacks Using AVISPA. Search on Bibsonomy ICISS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Ruhul Amin 0001, SK Hafizul Islam, Arijit Karati, G. P. Biswas Design of an enhanced authentication protocol and its verification using AVISPA. Search on Bibsonomy RAIT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Omid Mir, Theo P. van der Weide, Cheng-Chi Lee A Secure User Anonymity and Authentication Scheme Using AVISPA for Telecare Medical Information Systems. Search on Bibsonomy J. Medical Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Julio Ariel Hurtado Alegria, María Cecilia Bastarrica, Alexandre Bergel Avispa: a tool for analyzing software process models. Search on Bibsonomy J. Softw. Evol. Process. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Salekul Islam Security analysis of LMAP using AVISPA. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Shizra Sultan, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Ali Nasir Secure Protocol for Financial Transactions Using Smartphones - SPFT - Formally Proved by AVISPA. Search on Bibsonomy SECRYPT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Sheikh Ziauddin, Bruno Martin Formal Analysis of ISO/IEC 9798-2 Authentication Standard Using AVISPA. Search on Bibsonomy AsiaJCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
30Julio Ariel Hurtado Alegria, María Cecilia Bastarrica, Alexandre Bergel Analyzing software process models with AVISPA. Search on Bibsonomy ICSSP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Julio Ariel Hurtado Alegria, M. Cecilia Bastarrica, Alexandre Bergel Analyzing the Scrum Process Model with AVISPA. Search on Bibsonomy SCCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
30A. R. Rizwana Shaikh, Satish Devane Verification of security properties of payment protocol using AVISPA. Search on Bibsonomy ICITST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Pavel Ocenasek, Miroslav Svéda AVISPA: Towards practical verification of communication properties. Search on Bibsonomy PDeS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Antonio Muñoz 0001, Antonio Maña, Daniel Serrano Model Cheking Ambient Intelligence with AVISPA. Search on Bibsonomy AMIF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Luca Viganò 0001 Automated Security Protocol Analysis With the AVISPA Tool. Search on Bibsonomy MFPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Vicente Blanco Pérez, Patricia González, José Carlos Cabaleiro, Dora Blanco Heras, Tomás F. Pena, Juan J. Pombo, Francisco F. Rivera AVISPA: visualizing the performance prediction of parallel iterative solvers. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Jeroen A. J. Leijten, Geoffrey Burns, Jos Huisken, Erwin Waterlander, Antoine van Wel AVISPA: a massively parallel reconfigurable accelerator. Search on Bibsonomy SoC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Benoît Bertholon, Sébastien Varrette, Pascal Bouvry Certicloud: A Novel TPM-based Approach to Ensure Cloud IaaS Security. Search on Bibsonomy IEEE CLOUD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Scyther, Avispa, Cloud Computing, TPM, IaaS
28Sun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim 0001 A Secure Handover Protocol Design in Wireless Networks with Formal Verification. Search on Bibsonomy WWIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AVISPA, security, authentication, wireless, handover
20Antonio Muñoz 0001, Antonio Maña, Daniel Serrano SecMiLiA: An Approach in the Agent Protection. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Antonio Muñoz 0001, Antonio Maña, Rajesh Harjani, Marioli Montenegro Agent Protection Based on the Use of Cryptographic Hardware. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Satish Devane, Deepak B. Phatak Secure Transaction Protocol for CEPS Compliant EPS in Limited Connectivity Environment. Search on Bibsonomy EC-Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF E-commerce, Electronic Payment system, Payment Protocol
20Sebastian Mödersheim, Luca Viganò 0001 The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna Validating Security Protocols under the General Attacker. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Michael Backes 0001, Stefan Lorenz, Matteo Maffei, Kim Pecina The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Monika Maidl, David von Oheimb, Peter Hartmann, Richard Robinson Formal Security Analysis of Electronic Software Distribution Systems. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Judson Santiago, Laurent Vigneron Optimistic Non-repudiation Protocol Analysis. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Llanos Tobarra, Diego Cazorla, Fernando Cuartero, Gregorio Díaz 0001 Analysis of Web Services Secure Conversation with Formal Methods. Search on Bibsonomy ICIW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20David von Oheimb, Jorge Cuéllar Designing and Verifying Core Protocols for Location Privacy. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Geopriv, privacy, model checking, exploration, location information
20Mathieu Turuani The CL-Atse Protocol Analyser. Search on Bibsonomy RTA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò 0001, David A. Basin Formalizing and Analyzing Sender Invariance. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi Secure E-Commerce Transactions for Multicast Services. Search on Bibsonomy CEC/EEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Yannick Chevalier, Laurent Vigneron Strategy for Verifying Security Protocols with Unbounded Message Size. Search on Bibsonomy Autom. Softw. Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF intruder model, automatic strategies, verification, security protocols, flaw detection
Displaying result #1 - #42 of 42 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license