default search action
66.66th Birthday: Joshua D. Guttman , 2021
- Daniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim, Paul D. Rowe:
Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday. Lecture Notes in Computer Science 13066, Springer 2021, ISBN 978-3-030-91630-5 - Mohammad M. Ahmadpanah, Musard Balliu, Daniel Hedin, Lars Eric Olsson, Andrei Sabelfeld:
Securing Node-RED Applications. 1-21 - Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time and Space. 22-49 - Prajna Bhandary, Edward Zieglar, Charles Nicholas:
Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer. 50-76 - Karthikeyan Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters, Guido Schmitz, Tim Würtele:
A Tutorial-Style Introduction to DY*. 77-97 - Alessandro Bruni, Marco Carbone, Rosario Giustolisi, Sebastian Mödersheim, Carsten Schürmann:
Security Protocols as Choreographies. 98-111 - Véronique Cortier, Itsaka Rakotonirina:
How to Explain Security Protocols to Your Children. 112-123 - Pierpaolo Degano, Letterio Galletta, Selene Gerali:
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty. 124-138 - Alessandra Di Pierro, Massimiliano Incudini:
Quantum Machine Learning and Fraud Detection. 139-155 - Daniel J. Dougherty:
Model Finding for Exploration. 156-174 - Riccardo Focardi, Flaminia L. Luccio:
Secure Key Management Policies in Strand Spaces. 175-197 - Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark:
A Declaration of Software Independence. 198-217 - Dale M. Johnson:
Formal Methods and Mathematical Intuition. 218-231 - Kangsoo Jung, Sayan Biswas, Catuscia Palamidessi:
Establishing the Price of Privacy in Federated Data Trading. 232-250 - Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
On the Complexity of Verification of Time-Sensitive Distributed Systems. 251-275 - Sreekanth Malladi, Jonathan K. Millen:
Adapting Constraint Solving to Automatically Analyze UPI Protocols. 276-292 - Sebastian Mödersheim, Jorge Cuéllar:
Three Branches of Accountability. 293-311 - Flemming Nielson, René Rydhof Hansen, Hanne Riis Nielson:
Benign Interaction of Security Domains. 312-331 - Dusko Pavlovic:
Probabilistic Annotations for Protocol Models - Dedicated to Joshua Guttman. 332-347 - Sylvan Pinsky:
Joshua Guttman: Pioneering Strand Spaces. 348-354 - John D. Ramsdell:
Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran. 355-369 - Paul D. Rowe:
On Orderings in Security Models. 370-393 - Abigail Siegel, Mia Santomauro, Tristan Dyer, Tim Nelson, Shriram Krishnamurthi:
Prototyping Formal Methods Tools: A Protocol Analysis Case Study. 394-413 - Paul Syverson:
Principles of Remote Sattestation. 414-424
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.