default search action
David A. Basin
Person information
- affiliation: ETH Zurich, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j94]David A. Basin, Søren Debois, Thomas T. Hildebrandt:
Proactive enforcement of provisions and obligations. J. Comput. Secur. 32(3): 247-289 (2024) - [j93]Si Liu, Luca Multazzu, Hengfeng Wei, David A. Basin:
NOC-NOC: Towards Performance-optimal Distributed Transactions. Proc. ACM Manag. Data 2(1): 9:1-9:25 (2024) - [j92]Srdan Krstic, Hoang Nguyen Phuoc Bao, David A. Basin:
Model-driven Privacy. Proc. Priv. Enhancing Technol. 2024(1): 314-329 (2024) - [j91]François Hublet, David A. Basin, Srdan Krstic:
User-Controlled Privacy: Taint, Track, and Control. Proc. Priv. Enhancing Technol. 2024(1): 597-616 (2024) - [j90]Long Gu, Si Liu, Tiancheng Xing, Hengfeng Wei, Yuxing Chen, David A. Basin:
IsoVista: Black-box Checking Database Isolation Guarantees. Proc. VLDB Endow. 17(12): 4325-4328 (2024) - [j89]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
Specifying and Verifying Information Flow Control in SELinux Configurations. ACM Trans. Priv. Secur. 27(4): 31:1-31:35 (2024) - [c222]François Hublet, Leonardo Lima, David A. Basin, Srdan Krstic, Dmitriy Traytel:
Proactive Real-Time First-Order Enforcement. CAV (2) 2024: 156-181 - [c221]David A. Basin, Xenia Hofmeier, Ralf Sasse, Jorge Toro-Pozo:
Getting Chip Card Payments Right. FM (1) 2024: 29-51 - [c220]Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, David A. Basin:
Automated Large-Scale Analysis of Cookie Notice Compliance. USENIX Security Symposium 2024 - [c219]Daniele Coppola, Giovanni Camurati, Claudio Anliker, Xenia Hofmeier, Patrick Schaller, David A. Basin, Srdjan Capkun:
PURE: Payments with UWB RElay-protection. USENIX Security Symposium 2024 - [c218]Huayi Duan, Marco Bearzi, Jodok Vieli, David A. Basin, Adrian Perrig, Si Liu, Bernhard Tellenbach:
CAMP: Compositional Amplification Attacks against DNS. USENIX Security Symposium 2024 - [c217]Felix Linker, David A. Basin:
SOAP: A Social Authentication Protocol. USENIX Security Symposium 2024 - [c216]Karel Kubicek, Jakob Merane, Ahmed Bouhoula, David A. Basin:
Automating Website Registration for Studying GDPR Compliance. WWW 2024: 1295-1306 - [d7]François Hublet, Leonardo Lima, David A. Basin, Srdan Krstic, Dmitriy Traytel:
Artifact for "Proactive Real-Time First-Order Enforcement". Version 3. Zenodo, 2024 [all versions] - [d6]François Hublet, Leonardo Lima, David A. Basin, Dmitriy Traytel, Srdan Krstic:
Artifact for "Proactive Real-Time First-Order Enforcement". Version 1. Zenodo, 2024 [all versions] - [d5]François Hublet, Leonardo Lima, David A. Basin, Dmitriy Traytel, Srdan Krstic:
Artifact for "Proactive Real-Time First-Order Enforcement". Version 2. Zenodo, 2024 [all versions] - [i33]Felix Linker, David A. Basin:
SOAP: A Social Authentication Protocol. CoRR abs/2402.03199 (2024) - [i32]João C. Pereira, Tobias Klenze, Sofia Giampietro, Markus Limbeck, Dionysios Spiliopoulos, Felix A. Wolf, Marco Eilers, Christoph Sprenger, David A. Basin, Peter Müller, Adrian Perrig:
Protocols to Code: Formal Verification of a Next-Generation Internet Router. CoRR abs/2405.06074 (2024) - [i31]Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David A. Basin:
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. IACR Cryptol. ePrint Arch. 2024: 1226 (2024) - [i30]Felix Linker, Ralf Sasse, David A. Basin:
A Formal Analysis of Apple's iMessage PQ3 Protocol. IACR Cryptol. ePrint Arch. 2024: 1395 (2024) - 2023
- [j88]Tobias Klenze, Christoph Sprenger, David A. Basin:
IsaNet: A framework for verifying secure data plane protocols. J. Comput. Secur. 31(3): 217-259 (2023) - [j87]Martin Raszyk, David A. Basin, Srdan Krstic, Dmitriy Traytel:
Efficient Evaluation of Arbitrary Relational Calculus Queries. Log. Methods Comput. Sci. 19(4) (2023) - [j86]Florian Turati, Karel Kubicek, Carlos Cotrini, David A. Basin:
Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System. Proc. Priv. Enhancing Technol. 2023(4): 117-131 (2023) - [j85]Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David A. Basin, Haixiang Li, Anqun Pan:
Efficient Black-box Checking of Snapshot Isolation in Databases. Proc. VLDB Endow. 16(6): 1264-1276 (2023) - [c215]Martín Ochoa, Hernán Vanegas, Jorge Toro-Pozo, David A. Basin:
SealClub: Computer-aided Paper Document Authentication. ACSAC 2023: 163-177 - [c214]David A. Basin:
Formal Methods for Payment Protocols. AsiaCCS 2023: 326 - [c213]David A. Basin, Srdan Krstic, Joshua Schneider, Dmitriy Traytel:
Correct and Efficient Policy Monitoring, a Retrospective. ATVA (1) 2023: 3-30 - [c212]Felix Linker, David A. Basin:
ADEM: An Authentic Digital EMblem. CCS 2023: 2815-2829 - [c211]David A. Basin, Juan Guarnizo, Srdan Krstic, Hoang Nguyen Phuoc Bao, Martín Ochoa:
Is Modeling Access Control Worth It? CCS 2023: 2830-2844 - [c210]François Hublet, David A. Basin, Srdan Krstic:
Enforcing the GDPR. ESORICS (2) 2023: 400-422 - [c209]David A. Basin, Daniel Stefan Dietiker, Srdan Krstic, Yvonne-Anne Pignolet, Martin Raszyk, Joshua Schneider, Arshavir Ter-Gabrielyan:
Monitoring the Internet Computer. FM 2023: 383-402 - [c208]Huayi Duan, Rubén Fischer, Jie Lou, Si Liu, David A. Basin, Adrian Perrig:
RHINE: Robust and High-performance Internet Naming with E2E Authenticity. NSDI 2023: 531-553 - [c207]Si Liu, Huayi Duan, Lukas Heimes, Marco Bearzi, Jodok Vieli, David A. Basin, Adrian Perrig:
A Formal Framework for End-to-End DNS Resolution. SIGCOMM 2023: 932-949 - [c206]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. SP 2023: 1077-1093 - [c205]Virgil D. Gligor, Adrian Perrig, David A. Basin:
Determining an Economic Value of High Assurance for Commodity Software Security. Security Protocols Workshop 2023: 228-242 - [c204]David A. Basin, Patrick Schaller, Jorge Toro-Pozo:
Inducing Authentication Failures to Bypass Credit Card PINs. USENIX Security Symposium 2023: 3065-3079 - [c203]Cyrill Krähenbühl, Marc Wyss, David A. Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier:
FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks. USENIX Security Symposium 2023: 5755-5772 - [i29]Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David A. Basin, Haixiang Li, Anqun Pan:
Efficient Black-box Checking of Snapshot Isolation in Databases. CoRR abs/2301.07313 (2023) - [i28]Florian Turati, Carlos Cotrini, Karel Kubicek, David A. Basin:
Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System. CoRR abs/2302.13635 (2023) - [i27]Cyrill Krähenbühl, Marc Wyss, David A. Basin, Vincent Lenders, Adrian Perrig, Martin Strohmeier:
FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks. CoRR abs/2304.03108 (2023) - 2022
- [b4]Laurent Chuat, Markus Legner, David A. Basin, David Hausheer, Samuel Hitz, Peter Müller, Adrian Perrig:
The Complete Guide to SCION - From Design Principles to Formal Verification. Information Security and Cryptography, Springer 2022, ISBN 978-3-031-05287-3 - [j84]David A. Basin, Cas Cremers, Jannik Dreier, Ralf Sasse:
Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols. IEEE Secur. Priv. 20(3): 24-32 (2022) - [j83]Si Liu, José Meseguer, Peter Csaba Ölveczky, Min Zhang, David A. Basin:
Bridging the semantic gap between qualitative and quantitative models of distributed systems. Proc. ACM Program. Lang. 6(OOPSLA2): 315-344 (2022) - [j82]Karel Kubicek, Jakob Merane, Carlos Cotrini, Alexander Stremitzer, Stefan Bechtold, David A. Basin:
Checking Websites' GDPR Consent Compliance for Marketing Emails. Proc. Priv. Enhancing Technol. 2022(2): 282-303 (2022) - [c202]Sven Hammann, Michael Crabb, Sasa Radomirovic, Ralf Sasse, David A. Basin:
"I'm Surprised So Much Is Connected". CHI 2022: 620:1-620:13 - [c201]Farzane Karami, David A. Basin, Einar Broch Johnsen:
DPL: A Language for GDPR Enforcement. CSF 2022: 112-129 - [c200]Thilo Weghorn, Si Liu, Christoph Sprenger, Adrian Perrig, David A. Basin:
N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures. CSF 2022: 147-162 - [c199]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
IFCIL: An Information Flow Configuration Language for SELinux. CSF 2022: 243-259 - [c198]François Hublet, David A. Basin, Srdan Krstic:
Real-Time Policy Enforcement with Metric First-Order Temporal Logic. ESORICS (2) 2022: 211-232 - [c197]Martin Raszyk, David A. Basin, Srdan Krstic, Dmitriy Traytel:
Practical Relational Calculus Query Evaluation. ICDT 2022: 11:1-11:21 - [c196]David A. Basin, Thibault Dardinier, Nico Hauser, Lukas Heimes, Jonathan Julián Huerta y Munive, Nicolas Kaletsch, Srdan Krstic, Emanuele Marsicano, Martin Raszyk, Joshua Schneider, Dawit Legesse Tirore, Dmitriy Traytel, Sheila Zingg:
VeriMon: A Formally Verified Monitoring Tool. ICTAC 2022: 1-6 - [c195]Dino Bollinger, Karel Kubicek, Carlos Cotrini, David A. Basin:
Automating Cookie Consent and GDPR Violation Detection. USENIX Security Symposium 2022: 2893-2910 - [d4]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. Version v1.0.0. Zenodo, 2022 [all versions] - [d3]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations. Version v1.0.0. Zenodo, 2022 [all versions] - [d2]David A. Basin, Daniel Stefan Dietiker, Srdan Krstic, Yvonne-Anne Pignolet, Martin Raszyk, Joshua Schneider, Arshavir Ter-Gabrielyan:
Monitoring the Internet Computer (Artifact). Zenodo, 2022 - [i26]Lorenzo Ceragioli, Letterio Galletta, Pierpaolo Degano, David A. Basin:
IFCIL: An Information Flow Configuration Language for SELinux (Extended Version). CoRR abs/2205.15915 (2022) - [i25]Martín Ochoa, Jorge Toro-Pozo, David A. Basin:
SealClub: Computer-aided Paper Document Authentication. CoRR abs/2210.07884 (2022) - [i24]Martin Raszyk, David A. Basin, Srdan Krstic, Dmitriy Traytel:
Efficient Evaluation of Arbitrary Relational Calculus Queries. CoRR abs/2210.09964 (2022) - [i23]Linard Arquint, Felix A. Wolf, Joseph Lallemand, Ralf Sasse, Christoph Sprenger, Sven N. Wiesner, David A. Basin, Peter Müller:
Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version). CoRR abs/2212.04171 (2022) - 2021
- [j81]Joshua Schneider, David A. Basin, Frederik Brix, Srdan Krstic, Dmitriy Traytel:
Scalable online first-order monitoring. Int. J. Softw. Tools Technol. Transf. 23(2): 185-208 (2021) - [c194]David A. Basin, Jannik Dreier, Sofia Giampietro, Sasa Radomirovic:
Verifying Table-Based Elections. CCS 2021: 2632-2652 - [c193]David A. Basin, Andreas Lochbihler, Ueli Maurer, S. Reza Sefidgar:
Abstract Modeling of System Communication in Constructive Cryptography using CryptHOL. CSF 2021: 1-16 - [c192]Lucca Hirschi, Lara Schmid, David A. Basin:
Fixing the Achilles Heel of E-Voting: The Bulletin Board. CSF 2021: 1-17 - [c191]Tobias Klenze, Christoph Sprenger, David A. Basin:
Formal Verification of Secure Forwarding Protocols. CSF 2021: 1-16 - [c190]David A. Basin, Ralf Sasse, Jorge Toro-Pozo:
The EMV Standard: Break, Fix, Verify. SP 2021: 1766-1781 - [c189]David A. Basin, Ralf Sasse, Jorge Toro-Pozo:
Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions. USENIX Security Symposium 2021: 179-194 - [c188]Aleksi Peltonen, Ralf Sasse, David A. Basin:
A comprehensive formal analysis of 5G handover. WISEC 2021: 1-12 - [d1]Tobias Klenze, Christoph Sprenger, David A. Basin:
Formal Verification of Secure Forwarding Protocols (Artifact). Zenodo, 2021 - 2020
- [j80]Giacomo Giuliari, Tobias Klenze, Markus Legner, David A. Basin, Adrian Perrig, Ankit Singla:
Internet backbones in space. Comput. Commun. Rev. 50(1): 25-37 (2020) - [j79]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda Gurses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. IEEE Data Eng. Bull. 43(2): 36-66 (2020) - [j78]Gabriele Costa, Letterio Galletta, Pierpaolo Degano, David A. Basin, Chiara Bodei:
Natural Projection as Partial Model Checking. J. Autom. Reason. 64(7): 1445-1481 (2020) - [j77]David A. Basin, Andreas Lochbihler, S. Reza Sefidgar:
CryptHOL: Game-Based Proofs in Higher-Order Logic. J. Cryptol. 33(2): 494-566 (2020) - [j76]Christoph Sprenger, Tobias Klenze, Marco Eilers, Felix A. Wolf, Peter Müller, Martin Clochard, David A. Basin:
Igloo: soundly linking compositional refinement and separation logic for distributed system verification. Proc. ACM Program. Lang. 4(OOPSLA): 152:1-152:31 (2020) - [j75]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Runtime Verification over Out-of-order Streams. ACM Trans. Comput. Log. 21(1): 5:1-5:43 (2020) - [c187]Martin Raszyk, David A. Basin, Dmitriy Traytel:
Multi-head Monitoring of Metric Dynamic Logic. ATVA 2020: 233-250 - [c186]David A. Basin, Thibault Dardinier, Lukas Heimes, Srdan Krstic, Martin Raszyk, Joshua Schneider, Dmitriy Traytel:
A Formally Verified, Optimized Monitor for Metric First-Order Dynamic Logic. IJCAR (1) 2020: 432-453 - [c185]Sven Hammann, Ralf Sasse, David A. Basin:
Privacy-Preserving OpenID Connect. AsiaCCS 2020: 277-289 - [c184]David A. Basin, Sasa Radomirovic, Lara Schmid:
Dispute Resolution in Voting. CSF 2020: 1-16 - [c183]Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig:
SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust. EuroS&P 2020: 624-638 - [c182]David A. Basin, Matthieu Gras, Srdan Krstic, Joshua Schneider:
Scalable Online Monitoring of Distributed Systems. RV 2020: 197-220 - [c181]Guillaume Girol, Lucca Hirschi, Ralf Sasse, Dennis Jackson, Cas Cremers, David A. Basin:
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols. USENIX Security Symposium 2020: 1857-1874 - [i22]David A. Basin, Sasa Radomirovic, Lara Schmid:
Dispute Resolution in Voting. CoRR abs/2005.03749 (2020) - [i21]Carmela Troncoso, Mathias Payer, Jean-Pierre Hubaux, Marcel Salathé, James R. Larus, Edouard Bugnion, Wouter Lueks, Theresa Stadler, Apostolos Pyrgelis, Daniele Antonioli, Ludovic Barman, Sylvain Chatel, Kenneth G. Paterson, Srdjan Capkun, David A. Basin, Jan Beutel, Dennis Jackson, Marc Roeschlin, Patrick Leu, Bart Preneel, Nigel P. Smart, Aysajan Abidin, Seda F. Gürses, Michael Veale, Cas Cremers, Michael Backes, Nils Ole Tippenhauer, Reuben Binns, Ciro Cattuto, Alain Barrat, Dario Fiore, Manuel Barbosa, Rui Oliveira, José Pereira:
Decentralized Privacy-Preserving Proximity Tracing. CoRR abs/2005.12273 (2020) - [i20]David A. Basin, Ralf Sasse, Jorge Toro-Pozo:
The EMV Standard: Break, Fix, Verify. CoRR abs/2006.08249 (2020) - [i19]Mohammad Torabi Dashti, David A. Basin:
A Theory of Black-Box Tests. CoRR abs/2006.10387 (2020) - [i18]Christoph Sprenger, Tobias Klenze, Marco Eilers, Felix A. Wolf, Peter Müller, Martin Clochard, David A. Basin:
Igloo: Soundly Linking Compositional Refinement and Separation Logic for Distributed System Verification. CoRR abs/2010.04749 (2020) - [i17]Lucca Hirschi, Lara Schmid, David A. Basin:
Fixing the Achilles Heel of E-Voting: The Bulletin Board. IACR Cryptol. ePrint Arch. 2020: 109 (2020)
2010 – 2019
- 2019
- [j74]David A. Basin, Bhargav Nagaraja Bhatt, Srdan Krstic, Dmitriy Traytel:
Almost event-rate independent monitoring. Formal Methods Syst. Des. 54(3): 449-478 (2019) - [j73]Damien Desfontaines, Andreas Lochbihler, David A. Basin:
Cardinality Estimators do not Preserve Privacy. Proc. Priv. Enhancing Technol. 2019(2): 26-46 (2019) - [c180]Joshua Schneider, David A. Basin, Frederik Brix, Srdan Krstic, Dmitriy Traytel:
Adaptive Online First-Order Monitoring. ATVA 2019: 133-150 - [c179]Martin Raszyk, David A. Basin, Srdan Krstic, Dmitriy Traytel:
Multi-head Monitoring of Metric Temporal Logic. ATVA 2019: 151-170 - [c178]David A. Basin, Lucca Hirschi, Ralf Sasse:
Symbolic Analysis of Identity-Based Protocols. Foundations of Security, Protocols, and Equational Reasoning 2019: 112-134 - [c177]Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David A. Basin:
The Next 700 Policy Miners: A Universal Method for Building Policy Miners. CCS 2019: 95-112 - [c176]Sven Hammann, Sasa Radomirovic, Ralf Sasse, David A. Basin:
User Account Access Graphs. CCS 2019: 1405-1422 - [c175]Andreas Lochbihler, S. Reza Sefidgar, David A. Basin, Ueli Maurer:
Formalizing Constructive Cryptography using CryptHOL. CSF 2019: 152-166 - [c174]Emma Arfelt, David A. Basin, Søren Debois:
Monitoring the GDPR. ESORICS (1) 2019: 681-699 - [c173]Marco Guarnieri, Musard Balliu, Daniel Schoepe, David A. Basin, Andrei Sabelfeld:
Information-Flow Control for Database-Backed Applications. EuroS&P 2019: 79-94 - [c172]Martin Raszyk, David A. Basin, Dmitriy Traytel:
From Nondeterministic to Multi-Head Deterministic Finite-State Transducers. ICALP 2019: 127:1-127:14 - [c171]Joshua Schneider, David A. Basin, Srdan Krstic, Dmitriy Traytel:
A Formally Verified Monitor for Metric First-Order Temporal Logic. RV 2019: 310-328 - [i16]Laurent Chuat, AbdelRahman Abdou, Ralf Sasse, Christoph Sprenger, David A. Basin, Adrian Perrig:
Proxy Certificates: The Missing Link in the Web's Chain of Trust. CoRR abs/1906.10775 (2019) - [i15]Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David A. Basin:
The Next 700 Policy Miners: A Universal Method for Building Policy Miners. CoRR abs/1908.05994 (2019) - [i14]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Runtime Verification over Out-of-order Streams. CoRR abs/1909.11593 (2019) - 2018
- [j72]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Algorithms for monitoring real-time properties. Acta Informatica 55(4): 309-338 (2018) - [j71]Christoph Sprenger, David A. Basin:
Refining security protocols. J. Comput. Secur. 26(1): 71-120 (2018) - [j70]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure. IEEE Trans. Dependable Secur. Comput. 15(3): 393-408 (2018) - [c170]David A. Basin, Bhargav Nagaraja Bhatt, Dmitriy Traytel:
Optimal Proofs for Linear Temporal Logic on Lasso Words. ATVA 2018: 37-55 - [c169]David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler:
A Formal Analysis of 5G Authentication. CCS 2018: 1383-1396 - [c168]David A. Basin, Sasa Radomirovic, Lara Schmid:
Alethea: A Provably Secure Random Sample Voting Protocol. CSF 2018: 283-297 - [c167]Carlos Cotrini, Thilo Weghorn, David A. Basin:
Mining ABAC Rules from Sparse Logs. EuroS&P 2018: 31-46 - [c166]David A. Basin, Søren Debois, Thomas T. Hildebrandt:
On Purpose and by Necessity: Compliance Under the GDPR. Financial Cryptography 2018: 20-37 - [c165]Tobias Klenze, Giacomo Giuliari, Christos Pappas, Adrian Perrig, David A. Basin:
Networking in Heaven as on Earth. HotNets 2018: 22-28 - [c164]Joshua Schneider, David A. Basin, Frederik Brix, Srdan Krstic, Dmitriy Traytel:
Scalable Online First-Order Monitoring. RV 2018: 353-371 - [c163]Gabriele Costa, David A. Basin, Chiara Bodei, Pierpaolo Degano, Letterio Galletta:
From Natural Projection to Partial Model Checking and Back. TACAS (1) 2018: 344-361 - [p5]David A. Basin, Cas Cremers, Catherine Meadows:
Model Checking Security Protocols. Handbook of Model Checking 2018: 727-762 - [i13]David A. Basin, Jannik Dreier, Lucca Hirschi, Sasa Radomirovic, Ralf Sasse, Vincent Stettler:
Formal Analysis of 5G Authentication. CoRR abs/1806.10360 (2018) - [i12]Damien Desfontaines, Andreas Lochbihler, David A. Basin:
Cardinality Estimators do not Preserve Privacy. CoRR abs/1808.05879 (2018) - 2017
- [j69]David A. Basin, Cas Cremers, Jannik Dreier, Ralf Sasse:
Symbolically analyzing security protocols using tamarin. ACM SIGLOG News 4(4): 19-30 (2017) - [c162]Mohammad Torabi Dashti, David A. Basin:
Tests and Refutation. ATVA 2017: 119-138 - [c161]Ognjen Maric, Christoph Sprenger, David A. Basin:
Cutoff Bounds for Consensus Algorithms. CAV (2) 2017: 217-237 - [c160]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Runtime Verification of Temporal Properties over Out-of-Order Data Streams. CAV (1) 2017: 356-376 - [c159]Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Securing Databases from Probabilistic Inference. CSF 2017: 343-359 - [c158]Joseph Lallemand, David A. Basin, Christoph Sprenger:
Refining Authenticated Key Agreement with Strong Adversaries. EuroS&P 2017: 92-107 - [c157]Marco Guarnieri, Petar Tsankov, Tristan Buchs, Mohammad Torabi Dashti, David A. Basin:
Test execution checkpointing for web applications. ISSTA 2017: 203-214 - [c156]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
The MonPoly Monitoring Tool. RV-CuBES 2017: 19-28 - [c155]David A. Basin, Srdjan Krstic, Dmitriy Traytel:
AERIAL: Almost Event-Rate Independent Algorithms for Monitoring Metric Regular Properties. RV-CuBES 2017: 29-36 - [c154]David A. Basin, Srdan Krstic, Dmitriy Traytel:
Almost Event-Rate Independent Monitoring of Metric Dynamic Logic. RV 2017: 85-102 - [c153]David A. Basin, Bhargav Nagaraja Bhatt, Dmitriy Traytel:
Almost Event-Rate Independent Monitoring of Metric Temporal Logic. TACAS (2) 2017: 94-112 - [c152]David A. Basin, Hans Gersbach, Akaki Mamageishvili, Lara Schmid, Oriol Tejada:
Election Security and Economics: It's All About Eve. E-VOTE-ID 2017: 1-20 - [i11]Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Securing Databases from Probabilistic Inference. CoRR abs/1706.02473 (2017) - [i10]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Runtime Verification of Temporal Properties over Out-of-order Data Streams. CoRR abs/1707.05555 (2017) - [i9]David A. Basin, Andreas Lochbihler, S. Reza Sefidgar:
CryptHOL: Game-based Proofs in Higher-order Logic. IACR Cryptol. ePrint Arch. 2017: 753 (2017) - 2016
- [j68]David A. Basin, Germano Caronni, Sarah Ereth, Matús Harvan, Felix Klaedtke, Heiko Mantel:
Scalable offline monitoring of temporal specifications. Formal Methods Syst. Des. 49(1-2): 75-108 (2016) - [j67]Andreas Fürst, Thai Son Hoang, David A. Basin, Naoto Sato, Kunihiko Miyazaki:
Large-scale system development using Abstract Data Types and refinement. Sci. Comput. Program. 131: 59-75 (2016) - [c151]David A. Basin, Søren Debois, Thomas T. Hildebrandt:
In the Nick of Time: Proactive Prevention of Obligation Violations. CSF 2016: 120-134 - [c150]David A. Basin, Sasa Radomirovic, Lara Schmid:
Modeling Human Errors in Security Protocols. CSF 2016: 325-340 - [c149]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Access Control Synthesis for Physical Spaces. CSF 2016: 443-457 - [c148]Mohammad Torabi Dashti, David A. Basin:
Security Testing Beyond Functional Tests. ESSoS 2016: 1-19 - [c147]Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Strong and Provably Secure Database Access Control. EuroS&P 2016: 163-178 - [i8]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Access Control Synthesis for Physical Spaces. CoRR abs/1605.01769 (2016) - [i7]Der-Yeuan Yu, Elizabeth Stobert, David A. Basin, Srdjan Capkun:
Exploring Website Location as a Security Indicator. CoRR abs/1610.03647 (2016) - 2015
- [j66]David A. Basin, Felix Klaedtke, Srdjan Marinovic, Eugen Zalinescu:
Monitoring of temporal first-order properties with aggregations. Formal Methods Syst. Des. 46(3): 262-285 (2015) - [j65]David A. Basin, Cas Cremers, Kunihiko Miyazaki, Sasa Radomirovic, Dai Watanabe:
Improving the Security of Cryptographic Protocol Standards. IEEE Secur. Priv. 13(3): 24-31 (2015) - [j64]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Greedily computing associative aggregations on sliding windows. Inf. Process. Lett. 115(2): 186-192 (2015) - [j63]David A. Basin, Felix Klaedtke, Samuel Müller, Eugen Zalinescu:
Monitoring Metric First-Order Temporal Properties. J. ACM 62(2): 15:1-15:45 (2015) - [c146]David A. Basin, Michel Keller, Sasa Radomirovic, Ralf Sasse:
Alice and Bob Meet Equational Theories. Logic, Rewriting, and Concurrency 2015: 160-180 - [c145]David A. Basin, Jannik Dreier, Ralf Sasse:
Automated Symbolic Proofs of Observational Equivalence. CCS 2015: 1144-1155 - [c144]Carlos Cotrini Jiménez, Thilo Weghorn, David A. Basin, Manuel Clavel:
Analyzing First-Order Role Based Access Control. CSF 2015: 3-17 - [c143]David A. Basin, Sasa Radomirovic, Michael Schläpfer:
A Complete Characterization of Secure Human-Server Communication. CSF 2015: 199-213 - [c142]Ognjen Maric, Christoph Sprenger, David A. Basin:
Consensus Refined. DSN 2015: 391-402 - [c141]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Failure-aware Runtime Verification of Distributed Systems. FSTTCS 2015: 590-603 - [c140]Grgur Petric Maretic, Muhammad Torabi Dashti, David A. Basin:
Semantic Vacuity. TIME 2015: 111-120 - [i6]Marco Guarnieri, Srdjan Marinovic, David A. Basin:
Strong and Provably Secure Database Access Control. CoRR abs/1512.01479 (2015) - 2014
- [j62]Joel Reardon, David A. Basin, Srdjan Capkun:
On Secure Data Deletion. IEEE Secur. Priv. 12(3): 37-44 (2014) - [j61]Grgur Petric Maretic, Mohammad Torabi Dashti, David A. Basin:
LTL is closed under topological closure. Inf. Process. Lett. 114(8): 408-413 (2014) - [j60]David A. Basin, Carlos Cotrini Jiménez, Felix Klaedtke, Eugen Zalinescu:
Deciding safety and liveness in TPTL. Inf. Process. Lett. 114(12): 680-688 (2014) - [j59]David A. Basin, Samuel J. Burri, Günter Karjoth:
Obstruction-free authorization enforcement: Aligning security and business objectives. J. Comput. Secur. 22(5): 661-698 (2014) - [j58]Marco Guarnieri, David A. Basin:
Optimal Security-Aware Query Processing. Proc. VLDB Endow. 7(12): 1307-1318 (2014) - [j57]David A. Basin, Cas Cremers:
Know Your Enemy: Compromising Adversaries in Protocol Analysis. ACM Trans. Inf. Syst. Secur. 17(2): 7:1-7:31 (2014) - [j56]David A. Basin, Manuel Clavel, Marina Egea, Miguel Angel García de Dios, Carolina Dania:
A Model-Driven Methodology for Developing Secure Data-Management Applications. IEEE Trans. Software Eng. 40(4): 324-337 (2014) - [c139]Andreas Fürst, Thai Son Hoang, David A. Basin, Naoto Sato, Kunihiko Miyazaki:
Formal System Modelling Using Abstract Data Types in Event-B. ABZ 2014: 222-237 - [c138]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
ARPKI: Attack Resilient Public-Key Infrastructure. CCS 2014: 382-393 - [c137]Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin:
Fail-Secure Access Control. CCS 2014: 1157-1168 - [c136]David A. Basin, Cas Cremers, Marko Horvat:
Actor Key Compromise: Consequences and Countermeasures. CSF 2014: 244-258 - [c135]Grgur Petric Maretic, Mohammad Torabi Dashti, David A. Basin:
Anchored LTL separation. CSL-LICS 2014: 74:1-74:9 - [c134]Andreas Fürst, Thai Son Hoang, David A. Basin, Krishnaji Desai, Naoto Sato, Kunihiko Miyazaki:
Code Generation for Event-B. IFM 2014: 323-338 - [c133]Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin:
Decentralized Composite Access Control. POST 2014: 245-264 - [c132]David A. Basin, Germano Caronni, Sarah Ereth, Matús Harvan, Felix Klaedtke, Heiko Mantel:
Scalable Offline Monitoring. RV 2014: 31-47 - [c131]David A. Basin, Felix Klaedtke, Srdjan Marinovic, Eugen Zalinescu:
On Real-Time Monitoring with Imprecise Timestamps. RV 2014: 193-198 - [c130]Benedikt Schmidt, Ralf Sasse, Cas Cremers, David A. Basin:
Automated Verification of Group Key Agreement Protocols. IEEE Symposium on Security and Privacy 2014: 179-194 - [c129]Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, David A. Basin:
Short paper: detection of GPS spoofing attacks in power grids. WISEC 2014: 99-104 - [p4]Miguel Angel García de Dios, Carolina Dania, David A. Basin, Manuel Clavel:
Model-Driven Development of a Secure eHealth Application. Engineering Secure Future Internet Services and Systems 2014: 97-118 - 2013
- [j55]Simon Meier, Cas Cremers, David A. Basin:
Efficient construction of machine-checked symbolic protocol security proofs. J. Comput. Secur. 21(1): 41-87 (2013) - [j54]David A. Basin, Cas Cremers, Simon Meier:
Provably repairing the ISO/IEC 9798 standard for entity authentication. J. Comput. Secur. 21(6): 817-846 (2013) - [j53]Mario Frank, Joachim M. Buhmann, David A. Basin:
Role Mining with Probabilistic Models. ACM Trans. Inf. Syst. Secur. 15(4): 15:1-15:28 (2013) - [j52]David A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu:
Enforceable Security Policies Revisited. ACM Trans. Inf. Syst. Secur. 16(1): 3 (2013) - [j51]Daniel Fischer, David A. Basin, Knut Eckstein, Thomas Engel:
Predictable Mobile Routing for Spacecraft Networks. IEEE Trans. Mob. Comput. 12(6): 1174-1187 (2013) - [j50]David A. Basin, Matús Harvan, Felix Klaedtke, Eugen Zalinescu:
Monitoring Data Usage in Distributed Systems. IEEE Trans. Software Eng. 39(10): 1403-1426 (2013) - [c128]Simon Meier, Benedikt Schmidt, Cas Cremers, David A. Basin:
The TAMARIN Prover for the Symbolic Analysis of Security Protocols. CAV 2013: 696-701 - [c127]Joel Reardon, Hubert Ritzdorf, David A. Basin, Srdjan Capkun:
Secure data deletion from persistent media. CCS 2013: 271-284 - [c126]Bruno Conchinha, David A. Basin, Carlos Caleiro:
Symbolic Probabilistic Analysis of Off-Line Guessing. ESORICS 2013: 363-380 - [c125]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Semi-valid input coverage for fuzz testing. ISSTA 2013: 56-66 - [c124]David A. Basin, Felix Klaedtke, Srdjan Marinovic, Eugen Zalinescu:
Monitoring of Temporal First-Order Properties with Aggregations. RV 2013: 40-58 - [c123]Joel Reardon, David A. Basin, Srdjan Capkun:
SoK: Secure Data Deletion. IEEE Symposium on Security and Privacy 2013: 301-315 - [p3]David A. Basin, Thai Son Hoang:
Technology Transfer. Industrial Deployment of System Engineering Methods 2013: 187-196 - [e7]David A. Basin, John C. Mitchell:
Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings. Lecture Notes in Computer Science 7796, Springer 2013, ISBN 978-3-642-36829-5 [contents] - 2012
- [j49]David A. Basin, Srdjan Capkun:
The research value of publishing attacks. Commun. ACM 55(11): 22-24 (2012) - [j48]Mario Frank, Andreas P. Streich, David A. Basin, Joachim M. Buhmann:
Multi-Assignment Clustering for Boolean Data. J. Mach. Learn. Res. 13: 459-489 (2012) - [j47]David A. Basin, Samuel J. Burri, Günter Karjoth:
Dynamic enforcement of abstract separation of duty constraints. ACM Trans. Inf. Syst. Secur. 15(3): 13:1-13:30 (2012) - [c122]Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin:
User-level secure deletion on log-structured file systems. AsiaCCS 2012: 63-64 - [c121]Benedikt Schmidt, Simon Meier, Cas Cremers, David A. Basin:
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties. CSF 2012: 78-94 - [c120]Christoph Sprenger, David A. Basin:
Refining Key Establishment. CSF 2012: 230-246 - [c119]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
SECFUZZ: Fuzz-testing security protocols. AST 2012: 1-7 - [c118]David A. Basin, Cas Cremers, Simon Meier:
Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication. POST 2012: 129-148 - [c117]David A. Basin, Vincent Jugé, Felix Klaedtke, Eugen Zalinescu:
Enforceable Security Policies Revisited. POST 2012: 309-328 - [c116]David A. Basin, Felix Klaedtke, Srdjan Marinovic, Eugen Zalinescu:
Monitoring Compliance Policies over Incomplete and Disagreeing Logs. RV 2012: 151-167 - [c115]David A. Basin, Samuel J. Burri, Günter Karjoth:
Optimal workflow-aware authorizations. SACMAT 2012: 93-102 - [c114]Joel Reardon, Srdjan Capkun, David A. Basin:
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. USENIX Security Symposium 2012: 333-348 - [i5]David A. Basin, Andreas Fürst, Thai Son Hoang, Kunihiko Miyazaki, Naoto Sato:
Abstract Data Types in Event-B - An Application of Generic Instantiation. CoRR abs/1210.7283 (2012) - [i4]Mario Frank, Joachim M. Buhmann, David A. Basin:
Role Mining with Probabilistic Models. CoRR abs/1212.4775 (2012) - 2011
- [b3]David A. Basin, Patrick Schaller, Michael Schläpfer:
Applied Information Security - a Hands-on Approach. Springer 2011, ISBN 978-3-642-24473-5, pp. I-XIV, 1-202 - [j46]Boris Köpf, David A. Basin:
Automatically deriving information-theoretic bounds for adaptive side-channel attacks. J. Comput. Secur. 19(1): 1-31 (2011) - [j45]David A. Basin, Carlos Caleiro, Jaime Ramos, Luca Viganò:
Distributed temporal logic for the analysis of security protocol models. Theor. Comput. Sci. 412(31): 4007-4043 (2011) - [j44]David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt:
Formal Reasoning about Physical Properties of Security Protocols. ACM Trans. Inf. Syst. Secur. 14(2): 16:1-16:28 (2011) - [c113]David A. Basin, Samuel J. Burri, Günter Karjoth:
Separation of duties as a service. AsiaCCS 2011: 423-429 - [c112]David A. Basin, Samuel J. Burri, Günter Karjoth:
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. CSF 2011: 99-113 - [c111]David A. Basin, Manuel Clavel, Marina Egea, Miguel Angel García de Dios, Carolina Dania, Gonzalo Ortiz, Javier Valdazo:
Model-Driven Development of Security-Aware GUIs for Data-Centric Applications. FOSAD 2011: 101-124 - [c110]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Constructing Mid-Points for Two-Party Asynchronous Protocols. OPODIS 2011: 481-496 - [c109]Bruno Conchinha, David A. Basin, Carlos Caleiro:
FAST: An Efficient Decision Procedure for Deduction and Static Equivalence. RTA 2011: 11-20 - [c108]David A. Basin, Felix Klaedtke, Eugen Zalinescu:
Algorithms for Monitoring Real-Time Properties. RV 2011: 260-275 - [c107]David A. Basin, Matús Harvan, Felix Klaedtke, Eugen Zalinescu:
MONPOLY: Monitoring Usage-Control Policies. RV 2011: 360-364 - [c106]David A. Basin, Manuel Clavel, Marina Egea:
A decade of model-driven security. SACMAT 2011: 1-10 - [c105]David A. Basin, Matús Harvan, Felix Klaedtke, Eugen Zalinescu:
Monitoring Usage-Control Policies in Distributed Systems. TIME 2011: 88-95 - [i3]Joel Reardon, Claudio Marforio, Srdjan Capkun, David A. Basin:
Secure Deletion on Log-structured File Systems. CoRR abs/1106.0917 (2011) - 2010
- [j43]Sebastian Mödersheim, Luca Viganò, David A. Basin:
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. J. Comput. Secur. 18(4): 575-618 (2010) - [j42]Michael Wahler, David A. Basin, Achim D. Brucker, Jana Koehler:
Efficient analysis of pattern-based constraint specifications. Softw. Syst. Model. 9(2): 225-255 (2010) - [c104]Christina Pöpper, David A. Basin, Srdjan Capkun, Cas Cremers:
Keeping data secret under full compromise using porter devices. ACSAC 2010: 241-250 - [c103]David A. Basin, Felix Klaedtke, Samuel Müller:
Policy Monitoring in First-Order Temporal Logic. CAV 2010: 1-18 - [c102]Christoph Sprenger, David A. Basin:
Developing security protocols by refinement. CCS 2010: 361-374 - [c101]Simon Meier, Cas Cremers, David A. Basin:
Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs. CSF 2010: 231-245 - [c100]Benedikt Schmidt, Patrick Schaller, David A. Basin:
Impossibility Results for Secret Establishment. CSF 2010: 261-273 - [c99]David A. Basin, Cas Cremers:
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. CSL 2010: 1-18 - [c98]David A. Basin, Cas Cremers:
Modeling and Analyzing Security in the Presence of Compromising Adversaries. ESORICS 2010: 340-356 - [c97]David A. Basin, Manuel Clavel, Marina Egea, Michael Schläpfer:
Automatic Generation of Smart, Security-Aware GUI Models. ESSoS 2010: 201-217 - [c96]Shin'ichiro Matsuo, Kunihiko Miyazaki, Akira Otsuka, David A. Basin:
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. Financial Cryptography Workshops 2010: 182-194 - [c95]Miguel Angel García de Dios, Carolina Dania, Michael Schläpfer, David A. Basin, Manuel Clavel, Marina Egea:
SSG: a model-based development environment for smart, security-aware GUIs. ICSE (2) 2010: 311-312 - [c94]Bruno Conchinha, David A. Basin, Carlos Caleiro:
Efficient Decision Procedures for Message Deducibility and Static Equivalence. Formal Aspects in Security and Trust 2010: 34-49 - [c93]David A. Basin, Felix Klaedtke, Samuel Müller:
Monitoring security policies with metric first-order temporal logic. SACMAT 2010: 23-34 - [c92]Mario Frank, Joachim M. Buhmann, David A. Basin:
On the definition of role mining. SACMAT 2010: 35-44 - [e6]Dengguo Feng, David A. Basin, Peng Liu:
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010. ACM 2010, ISBN 978-1-60558-936-7 [contents]
2000 – 2009
- 2009
- [j41]David A. Basin, Manuel Clavel, Jürgen Doser, Marina Egea:
Automated analysis of security-design models. Inf. Softw. Technol. 51(5): 815-831 (2009) - [j40]David A. Basin, Carlos Caleiro, Jaime Ramos, Luca Viganò:
Labelled Tableaux for Distributed Temporal Logic. J. Log. Comput. 19(6): 1245-1279 (2009) - [j39]Thai Son Hoang, Hironobu Kuruma, David A. Basin, Jean-Raymond Abrial:
Developing topology discovery in Event-B. Sci. Comput. Program. 74(11-12): 879-899 (2009) - [c91]Mario Frank, Andreas P. Streich, David A. Basin, Joachim M. Buhmann:
A probabilistic approach to hybrid role mining. CCS 2009: 101-111 - [c90]Patrick Schaller, Benedikt Schmidt, David A. Basin, Srdjan Capkun:
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. CSF 2009: 109-123 - [c89]David A. Basin, Samuel J. Burri, Günter Karjoth:
Dynamic Enforcement of Abstract Separation of Duty Constraints. ESORICS 2009: 250-267 - [c88]Andreas P. Streich, Mario Frank, David A. Basin, Joachim M. Buhmann:
Multi-assignment clustering for Boolean data. ICML 2009: 969-976 - [c87]Thai Son Hoang, Hironobu Kuruma, David A. Basin, Jean-Raymond Abrial:
Developing Topology Discovery in Event-B. IFM 2009: 1-19 - [c86]David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt:
Let's Get Physical: Models and Methods for Real-World Security Protocols. TPHOLs 2009: 1-22 - [e5]David A. Basin, Srdjan Capkun, Wenke Lee:
Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009. ACM 2009, ISBN 978-1-60558-460-7 [contents] - [i2]David A. Basin, Cas Cremers:
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries. IACR Cryptol. ePrint Arch. 2009: 79 (2009) - 2008
- [j38]Michael Näf, David A. Basin:
Two approaches to an information security laboratory. Commun. ACM 51(12): 138-142 (2008) - [j37]Panos Papadimitratos, Marcin Poturalski, Patrick Schaller, Pascal Lafourcade, David A. Basin, Srdjan Capkun, Jean-Pierre Hubaux:
Secure neighborhood discovery: a fundamental element for mobile ad hoc networking. IEEE Commun. Mag. 46(2): 132-139 (2008) - [j36]Rolf Oppliger, Ralf Hauser, David A. Basin:
SSL/TLS session-aware user authentication revisited. Comput. Secur. 27(3-4): 64-70 (2008) - [j35]Rolf Oppliger, Ralf Hauser, David A. Basin:
SSL/TLS Session-Aware User Authentication. Computer 41(3): 59-65 (2008) - [c85]Alexander Pretschner, Manuel Hilty, David A. Basin, Christian Schaefer, Thomas Walter:
Mechanisms for usage control. AsiaCCS 2008: 240-244 - [c84]Mario Frank, David A. Basin, Joachim M. Buhmann:
A class of probabilistic models for role engineering. CCS 2008: 299-310 - [c83]Christoph Sprenger, David A. Basin:
Cryptographically-Sound Protocol-Model Abstractions. CSF 2008: 115-129 - [c82]David A. Basin, Felix Klaedtke, Samuel Müller, Birgit Pfitzmann:
Runtime Monitoring of Metric First-order Temporal Properties. FSTTCS 2008: 49-60 - [c81]Daniel Fischer, David A. Basin, Thomas Engel:
Topology dynamics and routing for predictable mobile networks. ICNP 2008: 207-217 - [c80]David A. Basin, Carlos Caleiro, Jaime Ramos, Luca Viganò:
A Labeled Tableaux Systemfor the Distributed Temporal Logic DTL. TIME 2008: 101-109 - 2007
- [j34]David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki, Kazuo Takaragi, Burkhart Wolff:
Verifying a signature architecture: a comparative case study. Formal Aspects Comput. 19(1): 63-91 (2007) - [j33]Michael Backes, David A. Basin, Michael Waidner:
Preface. J. Comput. Secur. 15(6): 561 (2007) - [c79]Diana von Bidder, David A. Basin, Germano Caronni:
Midpoints Versus Endpoints: From Protocols to Firewalls. ACNS 2007: 46-64 - [c78]Patrick Schaller, Srdjan Capkun, David A. Basin:
BAP: Broadcast Authentication Using Cryptographic Puzzles. ACNS 2007: 401-419 - [c77]David A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç:
Specifying and analyzing security automata using CSP-OZ. AsiaCCS 2007: 70-81 - [c76]Boris Köpf, David A. Basin:
An information-theoretic model for adaptive side-channel attacks. CCS 2007: 286-296 - [c75]Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter:
A Policy Language for Distributed Usage Control. ESORICS 2007: 531-546 - [c74]Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter:
Monitors for Usage Control. IFIPTM 2007: 411-414 - [c73]Rolf Oppliger, Ralf Hauser, David A. Basin, Aldo Rodenhaeuser, Bruno Kaiser:
A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). KiVS 2007: 225-236 - [c72]David A. Basin, Manuel Clavel, Jürgen Doser, Marina Egea:
A Metamodel-Based Approach for Analyzing Security-Design Models. MoDELS 2007: 420-435 - [c71]Christoph Sprenger, David A. Basin:
A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols. TPHOLs 2007: 302-318 - [c70]Paul E. Sevinç, Mario Strasser, David A. Basin:
Securing the Distribution and Storage of Secrets with Trusted Platform Modules. WISTP 2007: 53-66 - 2006
- [j32]Alexander Pretschner, Manuel Hilty, David A. Basin:
Distributed usage control. Commun. ACM 49(9): 39-44 (2006) - [j31]Rolf Oppliger, Ralf Hauser, David A. Basin:
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. Comput. Commun. 29(12): 2238-2246 (2006) - [j30]Alessandro Armando, David A. Basin, Jorge Cuéllar, Michaël Rusinowitch, Luca Viganò:
Automated Reasoning for Security Protocol Analysis. J. Autom. Reason. 36(1-2): 1-3 (2006) - [j29]Carlos Caleiro, Luca Viganò, David A. Basin:
On the semantics of Alice&Bob specifications of security protocols. Theor. Comput. Sci. 367(1-2): 88-122 (2006) - [j28]David A. Basin, Jürgen Doser, Torsten Lodderstedt:
Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1): 39-91 (2006) - [c69]David A. Basin:
Model Driven Security. ARES 2006: 4 - [c68]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. CSFW 2006: 153-166 - [c67]Boris Köpf, David A. Basin:
Timing-Sensitive Information Flow Analysis for Synchronous Systems. ESORICS 2006: 243-262 - [c66]Paul E. Sevinç, David A. Basin, Ernst-Rüdiger Olderog:
Controlling Access to Documents: A Formal Access Control Model. ETRICS 2006: 352-367 - [c65]Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin:
Formalizing and Analyzing Sender Invariance. Formal Aspects in Security and Trust 2006: 80-95 - [i1]Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner:
Cryptographically Sound Theorem Proving. IACR Cryptol. ePrint Arch. 2006: 47 (2006) - 2005
- [b2]Alan Bundy, David A. Basin, Dieter Hutter, Andrew Ireland:
Rippling - meta-level guidance for mathematical reasoning. Cambridge tracts in theoretical computer science 56, Cambridge University Press 2005, ISBN 978-0-521-83449-0, pp. I-XIII, 1-202 - [j27]Carlos Caleiro, Luca Viganò, David A. Basin:
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis. Log. J. IGPL 13(6): 637-663 (2005) - [j26]David A. Basin, Sebastian Mödersheim, Luca Viganò:
OFMC: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3): 181-208 (2005) - [j25]Michael Näf, David A. Basin:
Konflikt oder Review zwei Ansätze für Labors in angewandter Informationssicherheit. Inform. Spektrum 28(5): 407-412 (2005) - [c64]Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - [c63]Manuel Hilty, David A. Basin, Alexander Pretschner:
On Obligations. ESORICS 2005: 98-117 - [c62]David A. Basin, Hironobu Kuruma, Kazuo Takaragi, Burkhart Wolff:
Verification of a Signature Architecture with HOL-Z. FM 2005: 269-285 - [c61]David A. Basin, Sebastian Mödersheim, Luca Viganò:
Algebraic Intruder Deductions. LPAR 2005: 549-564 - [c60]Diana Senn, David A. Basin, Germano Caronni:
Firewall Conformance Testing. TestCom 2005: 226-241 - [c59]Carlos Caleiro, Luca Viganò, David A. Basin:
Deconstructing Alice and Bob. ARSPA@ICALP 2005: 3-22 - 2004
- [j24]David A. Basin, Olivier Danvy, Robert Harper:
Editorial. High. Order Symb. Comput. 17(3): 171 (2004) - [j23]David A. Basin, Manuel Clavel, José Meseguer:
Reflective metalogical frameworks. ACM Trans. Comput. Log. 5(3): 528-576 (2004) - [c58]Carlos Caleiro, Luca Viganò, David A. Basin:
Metareasoning about Security Protocols using Distributed Temporal Logic. ARSPA@IJCAR 2004: 67-89 - [p2]David A. Basin, Yves Deville, Pierre Flener, Andreas Hamfelt, Jørgen Fischer Nilsson:
Synthesis of Programs in Computational Logic. Program Development in Computational Logic 2004: 30-65 - [e4]David A. Basin, Michaël Rusinowitch:
Automated Reasoning - Second International Joint Conference, IJCAR 2004, Cork, Ireland, July 4-8, 2004, Proceedings. Lecture Notes in Computer Science 3097, Springer 2004, ISBN 3-540-22345-2 [contents] - [e3]Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner:
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-971-3 [contents] - 2003
- [j22]David A. Basin, Stefan Friedrich, Marek Gawkowski:
Bytecode Verification by Model Checking. J. Autom. Reason. 30(3-4): 399-444 (2003) - [j21]Abdelwaheb Ayari, David A. Basin, Felix Klaedtke:
Decision procedures for inductive Boolean functions based on alternating automata. Theor. Comput. Sci. 300(1-3): 301-329 (2003) - [c57]David A. Basin, Sebastian Mödersheim, Luca Viganò:
CDiff: a new reduction technique for constraint-based analysis of security protocols. CCS 2003: 335-344 - [c56]David A. Basin, Sebastian Mödersheim, Luca Viganò:
An On-the-Fly Model-Checker for Security Protocol Analysis. ESORICS 2003: 253-270 - [c55]David A. Basin, Jürgen Doser, Torsten Lodderstedt:
Model driven security for process-oriented systems. SACMAT 2003: 100-109 - [c54]David A. Basin, Kunihiko Miyazaki, Kazuo Takaragi:
A Formal Analysis of a Digital Signature Architecture. IICIS 2003: 31-47 - [e2]Michael Backes, David A. Basin:
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003. ACM 2003, ISBN 1-58113-781-8 [contents] - [e1]David A. Basin, Burkhart Wolff:
Theorem Proving in Higher Order Logics, 16th International Conference, TPHOLs 2003, Rom, Italy, September 8-12, 2003, Proceedings. Lecture Notes in Computer Science 2758, Springer 2003, ISBN 3-540-40664-6 [contents] - 2002
- [c53]Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISS Security Protocol Analysis Tool. CAV 2002: 349-353 - [c52]David A. Basin:
The Next 700 Synthesis Calculi. FME 2002: 430 - [c51]Abdelwaheb Ayari, David A. Basin:
QUBOS: Deciding Quantified Boolean Logic Using Propositional Satisfiability Solvers. FMCAD 2002: 187-201 - [c50]David A. Basin, Stefan Friedrich, Marek Gawkowski, Joachim Posegga:
Bytecode Model Checking: An Experimental Analysis. SPIN 2002: 42-59 - [c49]David A. Basin, Stefan Friedrich, Marek Gawkowski:
Verified Bytecode Model Checkers. TPHOLs 2002: 47-66 - [c48]Torsten Lodderstedt, David A. Basin, Jürgen Doser:
SecureUML: A UML-Based Modeling Language for Model-Driven Security. UML 2002: 426-441 - [c47]David A. Basin, Frank Rittinger, Luca Viganò:
A Formal Analysis of the CORBA Security Service. ZB 2002: 330-349 - 2001
- [j20]David A. Basin, Harald Ganzinger:
Automated complexity analysis based on ordered resolution. J. ACM 48(1): 70-109 (2001) - [j19]David A. Basin, Amy P. Felty:
Current Trends in Logical Frameworks and Metalanguages. J. Autom. Reason. 27(1): 1-2 (2001) - [j18]Abdelwaheb Ayari, David A. Basin:
A Higher-order Interpretation of Deductive Tableau. J. Symb. Comput. 31(5): 487-520 (2001) - [j17]Ian Frank, David A. Basin:
A theoretical and empirical investigation of search in imperfect information games. Theor. Comput. Sci. 252(1-2): 217-256 (2001) - [c46]David A. Basin, Frank Rittinger, Luca Viganò:
A formal data-model of the CORBA security service. ESEC / SIGSOFT FSE 2001: 303-304 - [c45]Rafael Accorsi, David A. Basin, Luca Viganò:
Towards an awareness-based semantics for security protocol analysis. LACPV@CAV 2001: 5-24 - 2000
- [j16]David A. Basin, Seán Matthews:
Structuring Metatheory on Inductive Definitions. Inf. Comput. 162(1-2): 80-95 (2000) - [j15]Penny Anderson, David A. Basin:
Program Development Schemata as Derived Rules. J. Symb. Comput. 30(1): 5-36 (2000) - [c44]Ian Frank, David A. Basin, Alan Bundy:
Combining Knowledge and Search to Solve Single-Suit Bridge. AAAI/IAAI 2000: 195-200 - [c43]Abdelwaheb Ayari, David A. Basin:
Bounded Model Construction for Monadic Second-Order Logics. CAV 2000: 99-112 - [c42]Abdelwaheb Ayari, David A. Basin, Felix Klaedtke:
Decision Procedures for Inductive Boolean Functions Based on Alternating Automata. CAV 2000: 170-185 - [c41]David A. Basin, Stefan Friedrich, Sebastian Mödersheim:
B2M: A Semantic Based Tool for BLIF Hardware Descriptions. FMCAD 2000: 91-107 - [c40]David A. Basin, Manuel Clavel, José Meseguer:
Rewriting Logic as a Metalogical Framework. FSTTCS 2000: 55-80 - [c39]David A. Basin, Grit Denker:
Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis. WRLA 2000: 235-256
1990 – 1999
- 1999
- [j14]David A. Basin, Stefan Friedrich:
Modeling a Hardware Synthesis Methodology in Isabelle. Formal Methods Syst. Des. 15(2): 99-122 (1999) - [c38]David A. Basin, Stefan Friedrich, Joachim Posegga, Harald Vogt:
Java Bytecode Verification by Model Checking. CAV 1999: 491-494 - [c37]David A. Basin:
Lazy Infinite-State Analysis of Security Protocols. CQRE 1999: 30-42 - [c36]Abdelwaheb Ayari, David A. Basin, Stefan Friedrich:
Structural and Behavioral Modeling with Monadic Logics. ISMVL 1999: 142-151 - [p1]David A. Basin, Bernd Krieg-Brückner:
Formalization of the Development Process. Algebraic Foundations of Systems Specification 1999: 521-562 - 1998
- [j13]Ian Frank, David A. Basin:
Search in Games with Incomplete Information: A Case Study Using Bridge Card Play. Artif. Intell. 100(1-2): 87-123 (1998) - [j12]David A. Basin:
Logical-Framework-Based Program Development. ACM Comput. Surv. 30(3es): 1 (1998) - [j11]Ian Frank, David A. Basin:
Search in Games with Incomplete Information: A Case Study Using Bridge Card Play. J. Int. Comput. Games Assoc. 21(3): 194 (1998) - [j10]David A. Basin, Seán Matthews, Luca Viganò:
Labelled Modal Logics: Quantifiers. J. Log. Lang. Inf. 7(3): 237-263 (1998) - [j9]David A. Basin, Seán Matthews, Luca Viganò:
Natural Deduction for Non-Classical Logics. Stud Logica 60(1): 119-160 (1998) - [c35]Ian Frank, David A. Basin, Hitoshi Matsubara:
Finding Optimal Strategies for Imperfect Information Games. AAAI/IAAI 1998: 500-507 - [c34]Ian Frank, David A. Basin:
Optimal Play against Best Defence: Complexity and Heuristics. Computers and Games 1998: 50-73 - [c33]David A. Basin, Stefan Friedrich:
Combining WS1S and HOL. FroCoS 1998: 39-56 - [c32]David A. Basin, Luca Viganò:
A Recipe for the Complexity Analysis of Non-Classical Logics. FroCoS 1998: 57-76 - [c31]David A. Basin, Seán Matthews:
Scoped metatheorems. WRLA 1998: 353-366 - 1997
- [j8]David A. Basin, Seán Matthews, Luca Viganò:
Labelled Propositional Modal Logics: Theory and Practice. J. Log. Comput. 7(6): 685-717 (1997) - [c30]Abdelwaheb Ayari, David A. Basin, Andreas Podelski:
LISA: A Specification Language Based on WS2S. CSL 1997: 18-34 - [c29]David A. Basin, Seán Matthews, Luca Viganò:
A New Method for Bounding the Complexity of Modal Logics. Kurt Gödel Colloquium 1997: 89-102 - [c28]David A. Basin, Seán Matthews, Luca Viganò:
Labelled Quantified Modal Logics. KI 1997: 171-182 - 1996
- [j7]Ina Kraan, David A. Basin, Alan Bundy:
Middle-Out Reasoning for Synthesis and Induction. J. Autom. Reason. 16(1-2): 113-145 (1996) - [j6]David A. Basin, Toby Walsh:
A Calculus for and Termination of Rippling. J. Autom. Reason. 16(1-2): 147-180 (1996) - [j5]David A. Basin, Seán Matthews:
Adding Metatheoretic Facilities to First-Order Theories. J. Log. Comput. 6(6): 835-849 (1996) - [c27]David A. Basin, Seán Matthews:
Structuring Metatheory on Inductive Definitions. CADE 1996: 171-185 - [c26]Francisco J. Cantu, Alan Bundy, Alan Smaill, David A. Basin:
Experiments in Automating Hardware Verification Using Inductive Proof Planning. FMCAD 1996: 94-108 - [c25]David A. Basin, Seán Matthews, Luca Viganò:
A Topography of Labelled Modal Logics. FroCoS 1996: 75-92 - [c24]David A. Basin, Seán Matthews, Luca Viganò:
Implementing Modal and Relevance Logics in a Logical Framework. KR 1996: 386-397 - [c23]David A. Basin, Harald Ganzinger:
Complexity Analysis Based on Ordered Resolution. LICS 1996: 456-465 - [c22]Abdelwaheb Ayari, David A. Basin:
Generic System Support for Deductive Program Development. TACAS 1996: 313-328 - [c21]David A. Basin, Stefan Friedrich:
Modeling a Hardware Synthesis Methodology in Isabelle. TPHOLs 1996: 33-50 - 1995
- [c20]Penny Anderson, David A. Basin:
Deriving and Applying Logic Program Transformers. ASIAN 1995: 301-318 - [c19]David A. Basin, Nils Klarlund:
Hardware Verification using Monadic Second-Order Logic. CAV 1995: 31-41 - 1994
- [j4]David A. Basin:
Generalized Rewriting in Type Theory. J. Inf. Process. Cybern. 30(5/6): 249-259 (1994) - [j3]David A. Basin:
A Term Equality Problem Equivalent to Graph Isomorphism. Inf. Process. Lett. 51(2): 61-66 (1994) - [c18]David A. Basin, Toby Walsh:
Termination Orderings for Rippling. CADE 1994: 466-483 - [c17]David A. Basin, Toby Walsh:
A Calculus for Rippling. CTRS 1994: 15-30 - [c16]Tetsuya Yoshida, Alan Bundy, Ian Green, Toby Walsh, David A. Basin:
Coloured Rippling: An Extension of a Theorem Proving Heuristic. ECAI 1994: 85-89 - [c15]David A. Basin:
IsaWhelk Interpreted in Isabelle. ICLP 1994: 741 - [c14]David A. Basin:
Logic Frameworks for Logic Programs. LOPSTR 1994: 1-16 - 1993
- [j2]Richard Barnett, David A. Basin, Jane Hesketh:
A Recursion Planning Analysis of Inductive Completion. Ann. Math. Artif. Intell. 8(3-4): 363-381 (1993) - [c13]David A. Basin, Seán Matthews:
A Conservative Extension of First-order Logic and Its Application to Theorem Proving. FSTTCS 1993: 151-160 - [c12]Ina Kraan, David A. Basin, Alan Bundy:
Middle-Out Reasoning for Logic Program Synthesis. ICLP 1993: 441-455 - [c11]David A. Basin, Toby Walsh:
Difference Unification. IJCAI 1993: 116-122 - [c10]David A. Basin, Alan Bundy, Ina Kraan, Seán Matthews:
A Framework for Program Development Based on Schematic Proof. IWSSD 1993: 162-171 - 1992
- [c9]David A. Basin, Toby Walsh:
Difference Matching. CADE 1992: 295-309 - [c8]Ian Frank, David A. Basin, Alan Bundy:
An Adaptation of Proof-Planning to Declarer Play in Bridge. ECAI 1992: 72-76 - [c7]Ina Kraan, David A. Basin, Alan Bundy:
Logic Program Synthesis via Proof Planning. LOPSTR 1992: 1-14 - 1991
- [j1]David A. Basin, Geoffrey M. Brown, Miriam Leeser:
Formally verified synthesis of combinational CMOS circuits. Integr. 11(3): 235-250 (1991) - [c6]David A. Basin, Fausto Giunchiglia, Paolo Traverso:
Automating Meta-Theory Creation and System Extension. AI*IA 1991: 48-57 - [c5]David A. Basin, Douglas J. Howe:
Some Normalization Properties of Martin-Löf's Type Theory, and Applications. TACS 1991: 475-494 - 1990
- [b1]David A. Basin:
Building Problem Solving Environments in Constructive Type Theory. Cornell University, USA, 1990 - [c4]David A. Basin:
Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators in Isomorphism Complete. CADE 1990: 251-260
1980 – 1989
- 1989
- [c3]David A. Basin:
Building Theories in Nuprl. Logic at Botik 1989: 12-25 - [c2]David A. Basin, Peter Del Vecchio:
Verification Of Combinational Logic in Nuprl. Hardware Specification, Verification and Synthesis 1989: 333-357 - 1988
- [c1]David A. Basin:
An Environment For Automated Reasoning About Partial Functions. CADE 1988: 101-110
Coauthor Index
aka: Mohammad Torabi Dashti
aka: Carlos Cotrini
aka: Srdjan Krstic
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint