Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Muhammad Torabi Dashti
@article{DBLP:journals/corr/abs-2006-10387, author = {Mohammad Torabi Dashti and David A. Basin}, title = {A Theory of Black-Box Tests}, journal = {CoRR}, volume = {abs/2006.10387}, year = {2020}, url = {https://arxiv.org/abs/2006.10387}, eprinttype = {arXiv}, eprint = {2006.10387}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-10387.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/WustTRD17, author = {Karl W{\"{u}}st and Petar Tsankov and Sasa Radomirovic and Mohammad Torabi Dashti}, title = {Force Open: Lightweight black box file repair}, journal = {Digit. Investig.}, volume = {20 Supplement}, pages = {S75--S82}, year = {2017}, url = {https://doi.org/10.1016/j.diin.2017.01.009}, doi = {10.1016/J.DIIN.2017.01.009}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/WustTRD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/DashtiB17, author = {Mohammad Torabi Dashti and David A. Basin}, editor = {Deepak D'Souza and K. Narayan Kumar}, title = {Tests and Refutation}, booktitle = {Automated Technology for Verification and Analysis - 15th International Symposium, {ATVA} 2017, Pune, India, October 3-6, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10482}, pages = {119--138}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68167-2\_9}, doi = {10.1007/978-3-319-68167-2\_9}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/atva/DashtiB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DashtiR17, author = {Mohammad Torabi Dashti and Sasa Radomirovic}, editor = {Sokratis K. Katsikas and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens and Costas Lambrinoudakis and Christos Kalloniatis and John Mylopoulos and Annie I. Ant{\'{o}}n and Stefanos Gritzalis}, title = {An Anti-pattern for Misuse Cases}, booktitle = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS 2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10683}, pages = {250--261}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72817-9\_16}, doi = {10.1007/978-3-319-72817-9\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/DashtiR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/GuarnieriTBDB17, author = {Marco Guarnieri and Petar Tsankov and Tristan Buchs and Mohammad Torabi Dashti and David A. Basin}, editor = {Tevfik Bultan and Koushik Sen}, title = {Test execution checkpointing for web applications}, booktitle = {Proceedings of the 26th {ACM} {SIGSOFT} International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14, 2017}, pages = {203--214}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3092703.3092710}, doi = {10.1145/3092703.3092710}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/GuarnieriTBDB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/TsankovDB16, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, title = {Access Control Synthesis for Physical Spaces}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {443--457}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.38}, doi = {10.1109/CSF.2016.38}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/TsankovDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/essos/DashtiB16, author = {Mohammad Torabi Dashti and David A. Basin}, editor = {Juan Caballero and Eric Bodden and Elias Athanasopoulos}, title = {Security Testing Beyond Functional Tests}, booktitle = {Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9639}, pages = {1--19}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-30806-7\_1}, doi = {10.1007/978-3-319-30806-7\_1}, timestamp = {Tue, 01 Jun 2021 15:22:49 +0200}, biburl = {https://dblp.org/rec/conf/essos/DashtiB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TsankovDB16, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, title = {Access Control Synthesis for Physical Spaces}, journal = {CoRR}, volume = {abs/1605.01769}, year = {2016}, url = {http://arxiv.org/abs/1605.01769}, eprinttype = {arXiv}, eprint = {1605.01769}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TsankovDB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/AsadpourD15, author = {Mahdi Asadpour and Mohammad Torabi Dashti}, title = {Scalable, privacy preserving radio-frequency identification protocol for the internet of things}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {8}, pages = {1932--1950}, year = {2015}, url = {https://doi.org/10.1002/cpe.3165}, doi = {10.1002/CPE.3165}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/AsadpourD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/RadomirovicD15, author = {Sasa Radomirovic and Mohammad Torabi Dashti}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Derailing Attacks}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {41--46}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_5}, doi = {10.1007/978-3-319-26096-9\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/RadomirovicD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Dashti15, author = {Mohammad Torabi Dashti}, editor = {Bruce Christianson and Petr Svenda and Vashek Maty{\'{a}}s and James A. Malcolm and Frank Stajano and Jonathan Anderson}, title = {Derailing Attacks (Transcript of Discussion)}, booktitle = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9379}, pages = {47--49}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26096-9\_6}, doi = {10.1007/978-3-319-26096-9\_6}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Dashti15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/MareticDB15, author = {Grgur Petric Maretic and Muhammad Torabi Dashti and David A. Basin}, editor = {Fabio Grandi and Martin Lange and Alessio Lomuscio}, title = {Semantic Vacuity}, booktitle = {22nd International Symposium on Temporal Representation and Reasoning, {TIME} 2015, Kassel, Germany, September 23-25, 2015}, pages = {111--120}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/TIME.2015.14}, doi = {10.1109/TIME.2015.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/MareticDB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MareticDB14, author = {Grgur Petric Maretic and Mohammad Torabi Dashti and David A. Basin}, title = {{LTL} is closed under topological closure}, journal = {Inf. Process. Lett.}, volume = {114}, number = {8}, pages = {408--413}, year = {2014}, url = {https://doi.org/10.1016/j.ipl.2014.03.001}, doi = {10.1016/J.IPL.2014.03.001}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/MareticDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TsankovMDB14, author = {Petar Tsankov and Srdjan Marinovic and Mohammad Torabi Dashti and David A. Basin}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Fail-Secure Access Control}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1157--1168}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660307}, doi = {10.1145/2660267.2660307}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TsankovMDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csl/MareticDB14, author = {Grgur Petric Maretic and Mohammad Torabi Dashti and David A. Basin}, editor = {Thomas A. Henzinger and Dale Miller}, title = {Anchored {LTL} separation}, booktitle = {Joint Meeting of the Twenty-Third {EACSL} Annual Conference on Computer Science Logic {(CSL)} and the Twenty-Ninth Annual {ACM/IEEE} Symposium on Logic in Computer Science (LICS), {CSL-LICS} '14, Vienna, Austria, July 14 - 18, 2014}, pages = {74:1--74:9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2603088.2603139}, doi = {10.1145/2603088.2603139}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csl/MareticDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/post/TsankovMDB14, author = {Petar Tsankov and Srdjan Marinovic and Mohammad Torabi Dashti and David A. Basin}, editor = {Mart{\'{\i}}n Abadi and Steve Kremer}, title = {Decentralized Composite Access Control}, booktitle = {Principles of Security and Trust - Third International Conference, {POST} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8414}, pages = {245--264}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54792-8\_14}, doi = {10.1007/978-3-642-54792-8\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/post/TsankovMDB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/RocchettoOD14, author = {Marco Rocchetto and Mart{\'{\i}}n Ochoa and Mohammad Torabi Dashti}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {Model-Based Detection of {CSRF}}, booktitle = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, pages = {30--43}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5\_3}, doi = {10.1007/978-3-642-55415-5\_3}, timestamp = {Wed, 25 Sep 2019 18:08:09 +0200}, biburl = {https://dblp.org/rec/conf/sec/RocchettoOD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/BlomeOLPD13, author = {Abian Blome and Mart{\'{\i}}n Ochoa and Keqin Li and Michele Peroli and Mohammad Torabi Dashti}, title = {{VERA:} {A} Flexible Model-Based Vulnerability Testing Tool}, booktitle = {Sixth {IEEE} International Conference on Software Testing, Verification and Validation, {ICST} 2013, Luxembourg, Luxembourg, March 18-22, 2013}, pages = {471--478}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICST.2013.65}, doi = {10.1109/ICST.2013.65}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/BlomeOLPD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/TsankovDB13, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, editor = {Mauro Pezz{\`{e}} and Mark Harman}, title = {Semi-valid input coverage for fuzz testing}, booktitle = {International Symposium on Software Testing and Analysis, {ISSTA} '13, Lugano, Switzerland, July 15-20, 2013}, pages = {56--66}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2483760.2483787}, doi = {10.1145/2483760.2483787}, timestamp = {Sun, 02 Oct 2022 16:10:12 +0200}, biburl = {https://dblp.org/rec/conf/issta/TsankovDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/WijsD12, author = {Anton Wijs and Mohammad Torabi Dashti}, title = {Extended beam search for non-exhaustive state space analysis}, journal = {J. Log. Algebraic Methods Program.}, volume = {81}, number = {1}, pages = {46--69}, year = {2012}, url = {https://doi.org/10.1016/j.jlap.2011.06.002}, doi = {10.1016/J.JLAP.2011.06.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/WijsD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taas/Dashti12, author = {Mohammad Torabi Dashti}, title = {Efficiency of optimistic fair exchange using trusted devices}, journal = {{ACM} Trans. Auton. Adapt. Syst.}, volume = {7}, number = {1}, pages = {3:1--3:18}, year = {2012}, url = {https://doi.org/10.1145/2168260.2168263}, doi = {10.1145/2168260.2168263}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/taas/Dashti12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/TsankovDB12, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, editor = {Daniel Hoffman and John Hughes and Dianxiang Xu}, title = {{SECFUZZ:} Fuzz-testing security protocols}, booktitle = {7th International Workshop on Automation of Software Test, {AST} 2012, Zurich, Switzerland, June 2-3, 2012}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IWAST.2012.6228985}, doi = {10.1109/IWAST.2012.6228985}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/TsankovDB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/FrauD12, author = {Simone Frau and Mohammad Torabi Dashti}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Analysis of Communicating Authorization Policies}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {97--112}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_7}, doi = {10.1007/978-3-642-38004-4\_7}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/stm/FrauD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12, author = {Alessandro Armando and Wihem Arsac and Tigran Avanesov and Michele Barletta and Alberto Calvi and Alessandro Cappai and Roberto Carbone and Yannick Chevalier and Luca Compagna and Jorge Cu{\'{e}}llar and Gabriel Erzse and Simone Frau and Marius Minea and Sebastian M{\"{o}}dersheim and David von Oheimb and Giancarlo Pellegrino and Serena Elisa Ponta and Marco Rocchetto and Micha{\"{e}}l Rusinowitch and Mohammad Torabi Dashti and Mathieu Turuani and Luca Vigan{\`{o}}}, editor = {Cormac Flanagan and Barbara K{\"{o}}nig}, title = {The {AVANTSSAR} Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 18th International Conference, {TACAS} 2012, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7214}, pages = {267--282}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28756-5\_19}, doi = {10.1007/978-3-642-28756-5\_19}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FrauD11, author = {Simone Frau and Mohammad Torabi Dashti}, title = {Integrated Specification and Verification of Security Protocols and Policies}, booktitle = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium, {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011}, pages = {18--32}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CSF.2011.9}, doi = {10.1109/CSF.2011.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FrauD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/DashtiCW11, author = {Mohammad Torabi Dashti and Jan Cederquist and Yanjing Wang}, editor = {Gilles Barthe and Anupam Datta and Sandro Etalle}, title = {Risk Balance in Optimistic Non-repudiation Protocols}, booktitle = {Formal Aspects of Security and Trust - 8th International Workshop, {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7140}, pages = {263--277}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29420-4\_17}, doi = {10.1007/978-3-642-29420-4\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/DashtiCW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/opodis/TsankovTB11, author = {Petar Tsankov and Mohammad Torabi Dashti and David A. Basin}, editor = {Antonio Fern{\'{a}}ndez Anta and Giuseppe Lipari and Matthieu Roy}, title = {Constructing Mid-Points for Two-Party Asynchronous Protocols}, booktitle = {Principles of Distributed Systems - 15th International Conference, {OPODIS} 2011, Toulouse, France, December 13-16, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7109}, pages = {481--496}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25873-2\_33}, doi = {10.1007/978-3-642-25873-2\_33}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/opodis/TsankovTB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/CederquistD11, author = {Jan Cederquist and Mohammad Torabi Dashti}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {Complexity of fairness constraints for the Dolev-Yao attacker model}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {1502--1509}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982507}, doi = {10.1145/1982185.1982507}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/CederquistD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AsadpourD11, author = {Mahdi Asadpour and Mohammad Torabi Dashti}, title = {A Privacy-Friendly {RFID} Protocol Using Reusable Anonymous Tickets}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {206--213}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.29}, doi = {10.1109/TRUSTCOM.2011.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AsadpourD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsd/FokkinkDW10, author = {Wan J. Fokkink and Mohammad Torabi Dashti and Anton Wijs}, editor = {Lu{\'{\i}}s Gomes and Victor Khomenko and Jo{\~{a}}o M. Fernandes}, title = {Partial Order Reduction for Branching Security Protocols}, booktitle = {10th International Conference on Application of Concurrency to System Design, {ACSD} 2010, Braga, Portugal, 21-25 June 2010}, pages = {191--200}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ACSD.2010.19}, doi = {10.1109/ACSD.2010.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsd/FokkinkDW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/BadbanD10, author = {Bahareh Badban and Mohammad Torabi Dashti}, editor = {Petr Hlinen{\'{y}} and Anton{\'{\i}}n Kucera}, title = {Semi-linear Parikh Images of Regular Expressions via Reduction}, booktitle = {Mathematical Foundations of Computer Science 2010, 35th International Symposium, {MFCS} 2010, Brno, Czech Republic, August 23-27, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6281}, pages = {653--664}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15155-2\_57}, doi = {10.1007/978-3-642-15155-2\_57}, timestamp = {Fri, 30 Aug 2019 10:02:28 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/BadbanD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crc/DashtiM10, author = {Mohammad Torabi Dashti and Sjouke Mauw}, editor = {Burton Rosenberg}, title = {Fair Exchange}, booktitle = {Handbook of Financial Cryptography and Security}, pages = {109--132}, publisher = {Chapman and Hall/CRC}, year = {2010}, url = {https://doi.org/10.1201/9781420059823-c5}, doi = {10.1201/9781420059823-C5}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crc/DashtiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MauwRD09, author = {Sjouke Mauw and Sasa Radomirovic and Mohammad Torabi Dashti}, title = {Minimal Message Complexity of Asynchronous Multi-party Contract Signing}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {13--25}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.15}, doi = {10.1109/CSF.2009.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MauwRD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/Dashti09, author = {Mohammad Torabi Dashti}, editor = {Rachid Guerraoui and Franck Petit}, title = {Optimistic Fair Exchange Using Trusted Devices}, booktitle = {Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, {SSS} 2009, Lyon, France, November 3-6, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5873}, pages = {711--725}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05118-0\_49}, doi = {10.1007/978-3-642-05118-0\_49}, timestamp = {Wed, 07 Dec 2022 23:13:25 +0100}, biburl = {https://dblp.org/rec/conf/sss/Dashti09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0903-4358, author = {Muhammad Torabi Dashti}, title = {Sums of powers via integration}, journal = {CoRR}, volume = {abs/0903.4358}, year = {2009}, url = {http://arxiv.org/abs/0903.4358}, eprinttype = {arXiv}, eprint = {0903.4358}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0903-4358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/DashtiNJ08, author = {Muhammad Torabi Dashti and Srijith Krishnan Nair and Hugo L. Jonker}, title = {Nuovo {DRM} Paradiso: Designing a Secure, Verified, Fair Exchange {DRM} Scheme}, journal = {Fundam. Informaticae}, volume = {89}, number = {4}, pages = {393--417}, year = {2008}, url = {http://content.iospress.com/articles/fundamenta-informaticae/fi89-4-03}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/DashtiNJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictac/OrzanD08, author = {Simona Orzan and Muhammad Torabi Dashti}, editor = {John S. Fitzgerald and Anne E. Haxthausen and H{\"{u}}sn{\"{u}} Yenig{\"{u}}n}, title = {Fair Exchange Is Incomparable to Consensus}, booktitle = {Theoretical Aspects of Computing - {ICTAC} 2008, 5th International Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5160}, pages = {349--363}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85762-4\_24}, doi = {10.1007/978-3-540-85762-4\_24}, timestamp = {Fri, 28 Feb 2020 14:02:33 +0100}, biburl = {https://dblp.org/rec/conf/ictac/OrzanD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/OrzanD08, author = {Simona Orzan and Muhammad Torabi Dashti}, editor = {Gadi Taubenfeld}, title = {Data Failures}, booktitle = {Distributed Computing, 22nd International Symposium, {DISC} 2008, Arcachon, France, September 22-24, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5218}, pages = {514--515}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87779-0\_42}, doi = {10.1007/978-3-540-87779-0\_42}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wdag/OrzanD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CederquistDM07, author = {Jan Cederquist and Muhammad Torabi Dashti and Sjouke Mauw}, title = {A Certified Email Protocol Using Key Chains}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {525--530}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.10}, doi = {10.1109/AINAW.2007.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/CederquistDM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asian/DashtiW07, author = {Muhammad Torabi Dashti and Yanjing Wang}, editor = {Iliano Cervesato}, title = {Risk Balance in Exchange Protocols}, booktitle = {Advances in Computer Science - {ASIAN} 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4846}, pages = {70--77}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76929-3\_8}, doi = {10.1007/978-3-540-76929-3\_8}, timestamp = {Thu, 10 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asian/DashtiW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atva/DashtiW07, author = {Muhammad Torabi Dashti and Anton Wijs}, editor = {Kedar S. Namjoshi and Tomohiro Yoneda and Teruo Higashino and Yoshio Okamura}, title = {Pruning State Spaces with Extended Beam Search}, booktitle = {Automated Technology for Verification and Analysis, 5th International Symposium, {ATVA} 2007, Tokyo, Japan, October 22-25, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4762}, pages = {543--552}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75596-8\_39}, doi = {10.1007/978-3-540-75596-8\_39}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/atva/DashtiW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsen/DashtiNJ07, author = {Muhammad Torabi Dashti and Srijith Krishnan Nair and Hugo L. Jonker}, editor = {Farhad Arbab and Marjan Sirjani}, title = {Nuovo {DRM} Paradiso: Towards a Verified Fair {DRM} Scheme}, booktitle = {International Symposium on Fundamentals of Software Engineering, International Symposium, {FSEN} 2007, Tehran, Iran, April 17-19, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4767}, pages = {33--48}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75698-9\_3}, doi = {10.1007/978-3-540-75698-9\_3}, timestamp = {Tue, 14 May 2019 10:00:43 +0200}, biburl = {https://dblp.org/rec/conf/fsen/DashtiNJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/NairDCT07, author = {Srijith Krishnan Nair and Muhammad Torabi Dashti and Bruno Crispo and Andrew S. Tanenbaum}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {A Hybrid {PKI-IBC} Based Ephemerizer System}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {241--252}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_21}, doi = {10.1007/978-0-387-72367-9\_21}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/NairDCT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/BlomCLOPPDW07, author = {Stefan Blom and Jens R. Calam{\'{e}} and Bert Lisser and Simona Orzan and Jun Pang and Jaco van de Pol and Muhammad Torabi Dashti and Anton Wijs}, editor = {Orna Grumberg and Michael Huth}, title = {Distributed Analysis with \emph{mu} {CRL:} {A} Compendium of Case Studies}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems, 13th International Conference, {TACAS} 2007, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2007 Braga, Portugal, March 24 - April 1, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4424}, pages = {683--689}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71209-1\_53}, doi = {10.1007/978-3-540-71209-1\_53}, timestamp = {Mon, 11 Sep 2023 15:43:49 +0200}, biburl = {https://dblp.org/rec/conf/tacas/BlomCLOPPDW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ChothiaPD07, author = {Tom Chothia and Jun Pang and Muhammad Torabi Dashti}, editor = {Alessandro Aldini and Franck van Breugel}, title = {Keeping Secrets in Resource Aware Components}, booktitle = {Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages, {QAPL} 2007, Braga, Portugal, March 24-25, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {190}, number = {3}, pages = {79--94}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.07.006}, doi = {10.1016/J.ENTCS.2007.07.006}, timestamp = {Fri, 20 Jan 2023 13:40:20 +0100}, biburl = {https://dblp.org/rec/journals/entcs/ChothiaPD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DashtiWL08, author = {Muhammad Torabi Dashti and Anton Wijs and Bert Lisser}, editor = {Ivana Cern{\'{a}} and Boudewijn R. Haverkort}, title = {Distributed Partial Order Reduction for Security Protocols}, booktitle = {Proceedings of the 6th International Workshop on Parallel and Distributed Methods in verifiCation, PDMC@CAV 2007, Berlin, Germany, July 8, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {198}, number = {1}, pages = {93--99}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2007.10.022}, doi = {10.1016/J.ENTCS.2007.10.022}, timestamp = {Mon, 13 Feb 2023 09:23:30 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DashtiWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CederquistD06, author = {Jan Cederquist and Muhammad Torabi Dashti}, editor = {Marianne Winslett and Andrew D. Gordon and David Sands}, title = {An intruder model for verifying liveness in security protocols}, booktitle = {Proceedings of the 2006 {ACM} workshop on Formal methods in security engineering, {FMSE} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {23--32}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180337.1180340}, doi = {10.1145/1180337.1180340}, timestamp = {Mon, 14 Feb 2022 09:20:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CederquistD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tgc/ChothiaOPD06, author = {Tom Chothia and Simona Orzan and Jun Pang and Muhammad Torabi Dashti}, editor = {Ugo Montanari and Donald Sannella and Roberto Bruni}, title = {A Framework for Automatically Checking Anonymity with \emph{mu} {CRL}}, booktitle = {Trustworthy Global Computing, Second Symposium, {TGC} 2006, Lucca, Italy, November 7-9, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4661}, pages = {301--318}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-75336-0\_19}, doi = {10.1007/978-3-540-75336-0\_19}, timestamp = {Sat, 31 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tgc/ChothiaOPD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/CederquistCD05, author = {J. G. Cederquist and Ricardo Corin and Muhammad Torabi Dashti}, editor = {Sihan Qing and Wenbo Mao and Javier L{\'{o}}pez and Guilin Wang}, title = {On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol}, booktitle = {Information and Communications Security, 7th International Conference, {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3783}, pages = {27--39}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11602897\_3}, doi = {10.1007/11602897\_3}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/CederquistCD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzIEEE/Dashti04, author = {Muhammad Torabi Dashti}, title = {A fuzzy automaton for control applications}, booktitle = {{IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE} 2004, Budapest, Hungary, July 25-29, 2004}, pages = {505--509}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/FUZZY.2004.1375782}, doi = {10.1109/FUZZY.2004.1375782}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fuzzIEEE/Dashti04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/CederquistD04, author = {Jan Cederquist and Muhammad Torabi Dashti}, editor = {Theodosis Dimitrakos and Fabio Martinelli}, title = {Formal Analysis of a Fair Payment Protocol}, booktitle = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7} Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse, France}, series = {{IFIP}}, volume = {173}, pages = {41--54}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24098-5\_4}, doi = {10.1007/0-387-24098-5\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/CederquistD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.