


default search action
66.66th Birthday: Joshua D. Guttman , 2021
- Daniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim

, Paul D. Rowe:
Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday. Lecture Notes in Computer Science 13066, Springer 2021, ISBN 978-3-030-91630-5 - Mohammad M. Ahmadpanah

, Musard Balliu, Daniel Hedin, Lars Eric Olsson, Andrei Sabelfeld:
Securing Node-RED Applications. 1-21 - Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, Julia Sapiña

:
Protocol Analysis with Time and Space. 22-49 - Prajna Bhandary, Edward Zieglar, Charles Nicholas:

Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer. 50-76 - Karthikeyan Bhargavan, Abhishek Bichhawat

, Quoc Huy Do, Pedram Hosseyni, Ralf Küsters
, Guido Schmitz
, Tim Würtele
:
A Tutorial-Style Introduction to DY*. 77-97 - Alessandro Bruni, Marco Carbone, Rosario Giustolisi, Sebastian Mödersheim

, Carsten Schürmann:
Security Protocols as Choreographies. 98-111 - Véronique Cortier, Itsaka Rakotonirina:

How to Explain Security Protocols to Your Children. 112-123 - Pierpaolo Degano

, Letterio Galletta
, Selene Gerali
:
Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty. 124-138 - Alessandra Di Pierro

, Massimiliano Incudini
:
Quantum Machine Learning and Fraud Detection. 139-155 - Daniel J. Dougherty:

Model Finding for Exploration. 156-174 - Riccardo Focardi, Flaminia L. Luccio:

Secure Key Management Policies in Strand Spaces. 175-197 - Wojciech Jamroga

, Peter Y. A. Ryan, Steve Schneider
, Carsten Schürmann, Philip B. Stark:
A Declaration of Software Independence. 198-217 - Dale M. Johnson:

Formal Methods and Mathematical Intuition. 218-231 - Kangsoo Jung, Sayan Biswas

, Catuscia Palamidessi:
Establishing the Price of Privacy in Federated Data Trading. 232-250 - Max I. Kanovich, Tajana Ban Kirigin

, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott:
On the Complexity of Verification of Time-Sensitive Distributed Systems. 251-275 - Sreekanth Malladi, Jonathan K. Millen

:
Adapting Constraint Solving to Automatically Analyze UPI Protocols. 276-292 - Sebastian Mödersheim

, Jorge Cuéllar:
Three Branches of Accountability. 293-311 - Flemming Nielson

, René Rydhof Hansen
, Hanne Riis Nielson
:
Benign Interaction of Security Domains. 312-331 - Dusko Pavlovic

:
Probabilistic Annotations for Protocol Models - Dedicated to Joshua Guttman. 332-347 - Sylvan Pinsky:

Joshua Guttman: Pioneering Strand Spaces. 348-354 - John D. Ramsdell

:
Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran. 355-369 - Paul D. Rowe:

On Orderings in Security Models. 370-393 - Abigail Siegel, Mia Santomauro, Tristan Dyer, Tim Nelson

, Shriram Krishnamurthi
:
Prototyping Formal Methods Tools: A Protocol Analysis Case Study. 394-413 - Paul Syverson:

Principles of Remote Sattestation. 414-424

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














