The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Dolev-Yao (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2000-2002 (18) 2003-2004 (33) 2005 (22) 2006 (16) 2007-2008 (28) 2009-2013 (17) 2014-2024 (10)
Publication types (Num. hits)
article(31) inproceedings(113)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 105 occurrences of 68 keywords

Results
Found 144 publication records. Showing 144 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
234Michael Backes 0001, Birgit Pfitzmann Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dolev-Yao-style, Reactive simulatability/UC, Limitations, XOR, Computational soundness
187Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Dolev-Yao, Symmetric authentication, Computational soundness
187Michael Backes 0001, Thomas Groß 0001 Tailoring the Dolev-Yao abstraction to web services realities. Search on Bibsonomy SWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Dolev Yao, security proof of protocols, formal method, tool support, security analysis, web services security, federated identity management, protocol model
164Michael Backes 0001, Birgit Pfitzmann Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
141Michael Backes 0001, Matthias Schunter From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. Search on Bibsonomy NSPW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF formal methods, cryptography
140Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
118Michael Backes 0001, Dominique Unruh Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Formal methods, zero-knowledge proofs, computational soundness
117Michael Backes 0001, Markus Dürmuth A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
94Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas Specifying electronic voting protocols in typed MSR. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Dolev-Yao intruder, typed MSR, privacy, specification, security protocols, electronic voting
94Michael Backes 0001, Markus Dürmuth, Ralf Küsters On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. Search on Bibsonomy FSTTCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
94Ran Canetti, Jonathan Herzog Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
93Michael Backes 0001, Birgit Pfitzmann Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
93Wenbo Mao A Structured Operational Modelling of the Dolev-Yao Threat Model. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
71Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. Search on Bibsonomy ACM Trans. Comput. Log. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Diffie-Hellman exponentiation, Dolev-Yao model, complexity, protocols, Algebraic properties
71Jean Goubault-Larrecq Towards Producing Formally Checkable Security Proofs, Automatically. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dolev-Yao model, h1, security, model-checking, first-order logic, tree automata, proofs, Coq, Paradox
71Jan Cederquist, Muhammad Torabi Dashti An intruder model for verifying liveness in security protocols. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Dolev-Yao intruder, intruder models, security protocols, liveness properties
71Michael Backes 0001, Birgit Pfitzmann Relating Symbolic and Cryptographic Secrecy. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability
71Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna Validating Security Protocols under the General Attacker. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
71Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Low-Level Ideal Signatures and General Integrity Idealization. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
71Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Symmetric Authentication within a Simulatable Cryptographic Library. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
71Joseph Y. Halpern, Riccardo Pucella Modeling Adversaries in a Logic for Security Protocol Analysis. Search on Bibsonomy FASec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
70Riccardo Bresciani, Andrew Butterfield Weakening the Dolev-Yao model through probability. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF protocol verification
70Detlef Kähler, Ralf Küsters, Thomas Wilke A Dolev-Yao-Based Definition of Abuse-Free Protocols. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
70Michael Backes 0001 A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
70Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Justifying a Dolev-Yao Model Under Active Attacks. Search on Bibsonomy FOSAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
70Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. Search on Bibsonomy CSL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
70Roberto M. Amadio, Witold Charatonik On Name Generation and Set-Based Analysis in the Dolev-Yao Model. Search on Bibsonomy CONCUR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF name generation, verification, cryptographic protocols, set constraints
47Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas Specifying and implementing privacy-preserving cryptographic protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Specification of Security Protocols, Dolev-Yao Intruder, Security-typed language, Typed MSR, Jif, Privacy, Linkability
47Roderick Chapman, Adrian Hilton 0002 Enforcing security and safety models with an information flow analysis tool. Search on Bibsonomy SIGAda The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Bell-LaPadula, Dolev-Yao, SPARK Ada, security, Ada, safety, information flow
47Laurent Mazaré Decidability of Opacity with Non-Atomic Keys. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Dolev-Yao Constraints, Security, Formal Verification, Decidability, Rewriting Systems, Opacity
47Nazim Benaïssa Modelling Attacker's Knowledge for Cascade Cryptographic Protocols. Search on Bibsonomy ABZ The full citation details ... 2008 DBLP  DOI  BibTeX  RDF model for attacker, formal methods, cryptography
47Peeter Laud, Long Ngo Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao Bootstrapping multi-party ad-hoc security. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bootstrapping security, pervasive computing
47Michael Backes 0001, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Stéphanie Delaune, Florent Jacquemard A Theory of Dictionary Attacks and its Complexity. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Roberto Zunino, Pierpaolo Degano A Note on the Perfect Encryption Assumption in a Process Calculus. Search on Bibsonomy FoSSaCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Angelo Troina, Alessandro Aldini, Roberto Gorrieri Towards a Formal Treatment of Secrecy Against Computational Adversaries. Search on Bibsonomy Global Computing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Jan Cederquist, Muhammad Torabi Dashti Formal Analysis of a Fair Payment Protocol. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Iliano Cervesato Data Access Specification and the Most Powerful Symbolic Attacker in MSR. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
47Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. Search on Bibsonomy ISSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
47Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck The faithfulness of abstract protocol analysis: message authentication. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
47Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson Static Analysis for Secrecy and Non-interference in Networks of Processes. Search on Bibsonomy PaCT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
46Itsaka Rakotonirina, Gilles Barthe, Clara Schneidewind Decision and Complexity of Dolev-Yao Hyperproperties. Search on Bibsonomy Proc. ACM Program. Lang. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
46Max Ammann, Lucca Hirschi, Steve Kremer DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
46Singam Bhargav Ram, Vanga Odelu Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover. Search on Bibsonomy CCWC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
46Andrew Cook, Luca Viganò 0001 A Game Of Drones: Extending the Dolev-Yao Attacker Model With Movement. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
46Anguraj Baskar, R. Ramanujam 0001, S. P. Suresh Dolev-Yao Theory with Associative Blindpair Operators. Search on Bibsonomy CIAA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
46Marco Rocchetto, Nils Ole Tippenhauer CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
46Christoph Ponikwar, Hans-Joachim Hof, Smriti Gopinath, Lars Wischhof Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
46Marco Rocchetto, Nils Ole Tippenhauer CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. Search on Bibsonomy ICFEM The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
46Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov Bounded memory Dolev-Yao adversaries in collaborative systems. Search on Bibsonomy Inf. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
46Ramaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh Extending Dolev-Yao with Assertions. Search on Bibsonomy ICISS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
46Mauricio Ayala-Rincón, Yuri Santos Rego Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model. Search on Bibsonomy J. Formaliz. Reason. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
46Murat Moran, James Heather Automated Analysis of Voting Systems with Dolev-Yao Intruder Model. Search on Bibsonomy Electron. Commun. Eur. Assoc. Softw. Sci. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
46Bogdan Groza, Marius Minea Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels. Search on Bibsonomy CRITIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
46István Vajda New look at impossibility result on Dolev-Yao models with hashes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
46Jan Cederquist, Mohammad Torabi Dashti Complexity of fairness constraints for the Dolev-Yao attacker model. Search on Bibsonomy SAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
46Qingliang Chen, Kaile Su, Chanjuan Liu, Yinyin Xiao Automatic Verification of Web Service Protocols for Epistemic Specifications under Dolev-Yao Model. Search on Bibsonomy ICSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
46Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh A dexptime-Complete Dolev-Yao Theory with Distributive Encryption. Search on Bibsonomy MFCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
46Zhiwei Li, Weichao Wang Deciding Recognizability under Dolev-Yao Intruder Model. Search on Bibsonomy ISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
46Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov Bounded Memory Dolev-Yao Adversaries in Collaborative Systems. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
46David A. Basin, Cas Cremers From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
46Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh A Dolev-Yao Model for Zero Knowledge. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Simon Kramer 0001 Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography. Search on Bibsonomy J. Log. Algebraic Methods Program. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Mathieu Baudet Random Polynomial-Time Attacks and Dolev-Yao Models. Search on Bibsonomy J. Autom. Lang. Comb. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
46Jonathan Herzog A computational interpretation of Dolev-Yao adversaries. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Roberto Zunino, Pierpaolo Degano Weakening the perfect encryption assumption in Dolev-Yao adversaries. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Wenbo Mao A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Michael Backes 0001, Birgit Pfitzmann Limits of the Cryptographic Realization of Dolev-Yao-style XOR. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
46Laurent Mazaré Satisfiability of Dolev-Yao Constraints. Search on Bibsonomy ARSPA@IJCAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Michael Backes 0001, Birgit Pfitzmann Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
46Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson Flow logic for Dolev-Yao secrecy in cryptographic processes. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Qi Mi, John A. Stankovic, Radu Stoleru Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless sensor networks, key distribution, secure localization
24David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt 0002 Let's Get Physical: Models and Methods for Real-World Security Protocols. Search on Bibsonomy TPHOLs The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Bogdan Groza, Marius Minea A Calculus to Detect Guessing Attacks. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Laurent Mazaré, Bogdan Warinschi Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Bruno Blanchet A Computationally Sound Mechanized Prover for Security Protocols. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Ralf Küsters, Tomasz Truderung Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security protocols, algebraic properties
24Myrto Arapinis, Stéphanie Delaune, Steve Kremer From One Session to Many: Dynamic Tags for Security Protocols. Search on Bibsonomy LPAR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Christoph Sprenger 0001, David A. Basin Cryptographically-Sound Protocol-Model Abstractions. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptographic soundness, formal methods, theorem proving, Cryptographic protocols, simulatability
24Riccardo Focardi, Matteo Centenaro Information flow security of multi-threaded distributed programs. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF symbolic cryptography, information flow, bisimulation, language-based security
24Ton van Deursen, Sjouke Mauw, Sasa Radomirovic Untraceability of RFID Protocols. Search on Bibsonomy WISTP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RFID protocols, formal verification, untraceability
24David Galindo, Flavio D. Garcia, Peter van Rossum Computational Soundness of Non-Malleable Commitments. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Wei Wang 0062, Dongyao Ji Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. Search on Bibsonomy FORTE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker
24Iliano Cervesato, Catherine Meadows 0001 One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF C.2.0.f Network-level security and protection, C.2.2.c Protocol verification, F.4.3 Formal Languages
24Virgil D. Gligor On the evolution of adversary models in security protocols: from the beginning to sensor networks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch Verifying Cryptographic Protocols with Subterms Constraints. Search on Bibsonomy LPAR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Alessandro Armando, Roberto Carbone, Luca Compagna LTL Model Checking for Security Protocols. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Véronique Cortier, Stéphanie Delaune, Graham Steel A Formal Theory of Key Conjuring. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Detlef Kähler, Ralf Küsters, Tomasz Truderung Infinite State AMC-Model Checking for Cryptographic Protocols. Search on Bibsonomy LICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn Verifying Smart Card Applications: An ASM Approach. Search on Bibsonomy IFM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Guoqiang Shu, David Lee 0001 Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Jeffrey A. Vaughan, Steve Zdancewic A Cryptographic Decentralized Label Model. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Stéphanie Delaune, Florent Jacquemard Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption
24Guoqiang Shu, David Lee 0001 Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. Search on Bibsonomy TestCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Christoph Sprenger 0001, Michael Backes 0001, David A. Basin, Birgit Pfitzmann, Michael Waidner Cryptographically Sound Theorem Proving. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 144 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license