BibTeX records: Muhammad Torabi Dashti

download as .bib file

@article{DBLP:journals/corr/abs-2006-10387,
  author       = {Mohammad Torabi Dashti and
                  David A. Basin},
  title        = {A Theory of Black-Box Tests},
  journal      = {CoRR},
  volume       = {abs/2006.10387},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.10387},
  eprinttype    = {arXiv},
  eprint       = {2006.10387},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-10387.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/WustTRD17,
  author       = {Karl W{\"{u}}st and
                  Petar Tsankov and
                  Sasa Radomirovic and
                  Mohammad Torabi Dashti},
  title        = {Force Open: Lightweight black box file repair},
  journal      = {Digit. Investig.},
  volume       = {20 Supplement},
  pages        = {S75--S82},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.diin.2017.01.009},
  doi          = {10.1016/J.DIIN.2017.01.009},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/WustTRD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atva/DashtiB17,
  author       = {Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Deepak D'Souza and
                  K. Narayan Kumar},
  title        = {Tests and Refutation},
  booktitle    = {Automated Technology for Verification and Analysis - 15th International
                  Symposium, {ATVA} 2017, Pune, India, October 3-6, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10482},
  pages        = {119--138},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68167-2\_9},
  doi          = {10.1007/978-3-319-68167-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/atva/DashtiB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DashtiR17,
  author       = {Mohammad Torabi Dashti and
                  Sasa Radomirovic},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {An Anti-pattern for Misuse Cases},
  booktitle    = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  pages        = {250--261},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72817-9\_16},
  doi          = {10.1007/978-3-319-72817-9\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DashtiR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/GuarnieriTBDB17,
  author       = {Marco Guarnieri and
                  Petar Tsankov and
                  Tristan Buchs and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Tevfik Bultan and
                  Koushik Sen},
  title        = {Test execution checkpointing for web applications},
  booktitle    = {Proceedings of the 26th {ACM} {SIGSOFT} International Symposium on
                  Software Testing and Analysis, Santa Barbara, CA, USA, July 10 - 14,
                  2017},
  pages        = {203--214},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3092703.3092710},
  doi          = {10.1145/3092703.3092710},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/GuarnieriTBDB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/TsankovDB16,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  title        = {Access Control Synthesis for Physical Spaces},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {443--457},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.38},
  doi          = {10.1109/CSF.2016.38},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/TsankovDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/DashtiB16,
  author       = {Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Juan Caballero and
                  Eric Bodden and
                  Elias Athanasopoulos},
  title        = {Security Testing Beyond Functional Tests},
  booktitle    = {Engineering Secure Software and Systems - 8th International Symposium,
                  ESSoS 2016, London, UK, April 6-8, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9639},
  pages        = {1--19},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-30806-7\_1},
  doi          = {10.1007/978-3-319-30806-7\_1},
  timestamp    = {Tue, 01 Jun 2021 15:22:49 +0200},
  biburl       = {https://dblp.org/rec/conf/essos/DashtiB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TsankovDB16,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  title        = {Access Control Synthesis for Physical Spaces},
  journal      = {CoRR},
  volume       = {abs/1605.01769},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.01769},
  eprinttype    = {arXiv},
  eprint       = {1605.01769},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TsankovDB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/AsadpourD15,
  author       = {Mahdi Asadpour and
                  Mohammad Torabi Dashti},
  title        = {Scalable, privacy preserving radio-frequency identification protocol
                  for the internet of things},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {8},
  pages        = {1932--1950},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3165},
  doi          = {10.1002/CPE.3165},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/AsadpourD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/RadomirovicD15,
  author       = {Sasa Radomirovic and
                  Mohammad Torabi Dashti},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Derailing Attacks},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {41--46},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_5},
  doi          = {10.1007/978-3-319-26096-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/RadomirovicD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Dashti15,
  author       = {Mohammad Torabi Dashti},
  editor       = {Bruce Christianson and
                  Petr Svenda and
                  Vashek Maty{\'{a}}s and
                  James A. Malcolm and
                  Frank Stajano and
                  Jonathan Anderson},
  title        = {Derailing Attacks (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXIII} - 23rd International Workshop, Cambridge,
                  UK, March 31 - April 2, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9379},
  pages        = {47--49},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26096-9\_6},
  doi          = {10.1007/978-3-319-26096-9\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Dashti15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/MareticDB15,
  author       = {Grgur Petric Maretic and
                  Muhammad Torabi Dashti and
                  David A. Basin},
  editor       = {Fabio Grandi and
                  Martin Lange and
                  Alessio Lomuscio},
  title        = {Semantic Vacuity},
  booktitle    = {22nd International Symposium on Temporal Representation and Reasoning,
                  {TIME} 2015, Kassel, Germany, September 23-25, 2015},
  pages        = {111--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIME.2015.14},
  doi          = {10.1109/TIME.2015.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/MareticDB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MareticDB14,
  author       = {Grgur Petric Maretic and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  title        = {{LTL} is closed under topological closure},
  journal      = {Inf. Process. Lett.},
  volume       = {114},
  number       = {8},
  pages        = {408--413},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ipl.2014.03.001},
  doi          = {10.1016/J.IPL.2014.03.001},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MareticDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TsankovMDB14,
  author       = {Petar Tsankov and
                  Srdjan Marinovic and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Fail-Secure Access Control},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1157--1168},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660307},
  doi          = {10.1145/2660267.2660307},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TsankovMDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csl/MareticDB14,
  author       = {Grgur Petric Maretic and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Thomas A. Henzinger and
                  Dale Miller},
  title        = {Anchored {LTL} separation},
  booktitle    = {Joint Meeting of the Twenty-Third {EACSL} Annual Conference on Computer
                  Science Logic {(CSL)} and the Twenty-Ninth Annual {ACM/IEEE} Symposium
                  on Logic in Computer Science (LICS), {CSL-LICS} '14, Vienna, Austria,
                  July 14 - 18, 2014},
  pages        = {74:1--74:9},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2603088.2603139},
  doi          = {10.1145/2603088.2603139},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csl/MareticDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/TsankovMDB14,
  author       = {Petar Tsankov and
                  Srdjan Marinovic and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Mart{\'{\i}}n Abadi and
                  Steve Kremer},
  title        = {Decentralized Composite Access Control},
  booktitle    = {Principles of Security and Trust - Third International Conference,
                  {POST} 2014, Held as Part of the European Joint Conferences on Theory
                  and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13,
                  2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8414},
  pages        = {245--264},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54792-8\_14},
  doi          = {10.1007/978-3-642-54792-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/post/TsankovMDB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/RocchettoOD14,
  author       = {Marco Rocchetto and
                  Mart{\'{\i}}n Ochoa and
                  Mohammad Torabi Dashti},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {Model-Based Detection of {CSRF}},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  pages        = {30--43},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5\_3},
  doi          = {10.1007/978-3-642-55415-5\_3},
  timestamp    = {Wed, 25 Sep 2019 18:08:09 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/RocchettoOD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icst/BlomeOLPD13,
  author       = {Abian Blome and
                  Mart{\'{\i}}n Ochoa and
                  Keqin Li and
                  Michele Peroli and
                  Mohammad Torabi Dashti},
  title        = {{VERA:} {A} Flexible Model-Based Vulnerability Testing Tool},
  booktitle    = {Sixth {IEEE} International Conference on Software Testing, Verification
                  and Validation, {ICST} 2013, Luxembourg, Luxembourg, March 18-22,
                  2013},
  pages        = {471--478},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICST.2013.65},
  doi          = {10.1109/ICST.2013.65},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icst/BlomeOLPD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issta/TsankovDB13,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Mauro Pezz{\`{e}} and
                  Mark Harman},
  title        = {Semi-valid input coverage for fuzz testing},
  booktitle    = {International Symposium on Software Testing and Analysis, {ISSTA}
                  '13, Lugano, Switzerland, July 15-20, 2013},
  pages        = {56--66},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2483760.2483787},
  doi          = {10.1145/2483760.2483787},
  timestamp    = {Sun, 02 Oct 2022 16:10:12 +0200},
  biburl       = {https://dblp.org/rec/conf/issta/TsankovDB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/WijsD12,
  author       = {Anton Wijs and
                  Mohammad Torabi Dashti},
  title        = {Extended beam search for non-exhaustive state space analysis},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {81},
  number       = {1},
  pages        = {46--69},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jlap.2011.06.002},
  doi          = {10.1016/J.JLAP.2011.06.002},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/WijsD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/taas/Dashti12,
  author       = {Mohammad Torabi Dashti},
  title        = {Efficiency of optimistic fair exchange using trusted devices},
  journal      = {{ACM} Trans. Auton. Adapt. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {3:1--3:18},
  year         = {2012},
  url          = {https://doi.org/10.1145/2168260.2168263},
  doi          = {10.1145/2168260.2168263},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/taas/Dashti12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/TsankovDB12,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Daniel Hoffman and
                  John Hughes and
                  Dianxiang Xu},
  title        = {{SECFUZZ:} Fuzz-testing security protocols},
  booktitle    = {7th International Workshop on Automation of Software Test, {AST} 2012,
                  Zurich, Switzerland, June 2-3, 2012},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/IWAST.2012.6228985},
  doi          = {10.1109/IWAST.2012.6228985},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/TsankovDB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/FrauD12,
  author       = {Simone Frau and
                  Mohammad Torabi Dashti},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Analysis of Communicating Authorization Policies},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_7},
  doi          = {10.1007/978-3-642-38004-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/FrauD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12,
  author       = {Alessandro Armando and
                  Wihem Arsac and
                  Tigran Avanesov and
                  Michele Barletta and
                  Alberto Calvi and
                  Alessandro Cappai and
                  Roberto Carbone and
                  Yannick Chevalier and
                  Luca Compagna and
                  Jorge Cu{\'{e}}llar and
                  Gabriel Erzse and
                  Simone Frau and
                  Marius Minea and
                  Sebastian M{\"{o}}dersheim and
                  David von Oheimb and
                  Giancarlo Pellegrino and
                  Serena Elisa Ponta and
                  Marco Rocchetto and
                  Micha{\"{e}}l Rusinowitch and
                  Mohammad Torabi Dashti and
                  Mathieu Turuani and
                  Luca Vigan{\`{o}}},
  editor       = {Cormac Flanagan and
                  Barbara K{\"{o}}nig},
  title        = {The {AVANTSSAR} Platform for the Automated Validation of Trust and
                  Security of Service-Oriented Architectures},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 18th International Conference, {TACAS} 2012, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2012, Tallinn, Estonia, March 24 - April 1, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7214},
  pages        = {267--282},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28756-5\_19},
  doi          = {10.1007/978-3-642-28756-5\_19},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tacas/ArmandoAABCCCCCCEFMMOPPRRDTV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FrauD11,
  author       = {Simone Frau and
                  Mohammad Torabi Dashti},
  title        = {Integrated Specification and Verification of Security Protocols and
                  Policies},
  booktitle    = {Proceedings of the 24th {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2011, Cernay-la-Ville, France, 27-29 June, 2011},
  pages        = {18--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CSF.2011.9},
  doi          = {10.1109/CSF.2011.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FrauD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/DashtiCW11,
  author       = {Mohammad Torabi Dashti and
                  Jan Cederquist and
                  Yanjing Wang},
  editor       = {Gilles Barthe and
                  Anupam Datta and
                  Sandro Etalle},
  title        = {Risk Balance in Optimistic Non-repudiation Protocols},
  booktitle    = {Formal Aspects of Security and Trust - 8th International Workshop,
                  {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7140},
  pages        = {263--277},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29420-4\_17},
  doi          = {10.1007/978-3-642-29420-4\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/DashtiCW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/opodis/TsankovTB11,
  author       = {Petar Tsankov and
                  Mohammad Torabi Dashti and
                  David A. Basin},
  editor       = {Antonio Fern{\'{a}}ndez Anta and
                  Giuseppe Lipari and
                  Matthieu Roy},
  title        = {Constructing Mid-Points for Two-Party Asynchronous Protocols},
  booktitle    = {Principles of Distributed Systems - 15th International Conference,
                  {OPODIS} 2011, Toulouse, France, December 13-16, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7109},
  pages        = {481--496},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25873-2\_33},
  doi          = {10.1007/978-3-642-25873-2\_33},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/opodis/TsankovTB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/CederquistD11,
  author       = {Jan Cederquist and
                  Mohammad Torabi Dashti},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {Complexity of fairness constraints for the Dolev-Yao attacker model},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {1502--1509},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982507},
  doi          = {10.1145/1982185.1982507},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/CederquistD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AsadpourD11,
  author       = {Mahdi Asadpour and
                  Mohammad Torabi Dashti},
  title        = {A Privacy-Friendly {RFID} Protocol Using Reusable Anonymous Tickets},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {206--213},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.29},
  doi          = {10.1109/TRUSTCOM.2011.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AsadpourD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsd/FokkinkDW10,
  author       = {Wan J. Fokkink and
                  Mohammad Torabi Dashti and
                  Anton Wijs},
  editor       = {Lu{\'{\i}}s Gomes and
                  Victor Khomenko and
                  Jo{\~{a}}o M. Fernandes},
  title        = {Partial Order Reduction for Branching Security Protocols},
  booktitle    = {10th International Conference on Application of Concurrency to System
                  Design, {ACSD} 2010, Braga, Portugal, 21-25 June 2010},
  pages        = {191--200},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ACSD.2010.19},
  doi          = {10.1109/ACSD.2010.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsd/FokkinkDW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mfcs/BadbanD10,
  author       = {Bahareh Badban and
                  Mohammad Torabi Dashti},
  editor       = {Petr Hlinen{\'{y}} and
                  Anton{\'{\i}}n Kucera},
  title        = {Semi-linear Parikh Images of Regular Expressions via Reduction},
  booktitle    = {Mathematical Foundations of Computer Science 2010, 35th International
                  Symposium, {MFCS} 2010, Brno, Czech Republic, August 23-27, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6281},
  pages        = {653--664},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15155-2\_57},
  doi          = {10.1007/978-3-642-15155-2\_57},
  timestamp    = {Fri, 30 Aug 2019 10:02:28 +0200},
  biburl       = {https://dblp.org/rec/conf/mfcs/BadbanD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crc/DashtiM10,
  author       = {Mohammad Torabi Dashti and
                  Sjouke Mauw},
  editor       = {Burton Rosenberg},
  title        = {Fair Exchange},
  booktitle    = {Handbook of Financial Cryptography and Security},
  pages        = {109--132},
  publisher    = {Chapman and Hall/CRC},
  year         = {2010},
  url          = {https://doi.org/10.1201/9781420059823-c5},
  doi          = {10.1201/9781420059823-C5},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crc/DashtiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MauwRD09,
  author       = {Sjouke Mauw and
                  Sasa Radomirovic and
                  Mohammad Torabi Dashti},
  title        = {Minimal Message Complexity of Asynchronous Multi-party Contract Signing},
  booktitle    = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009},
  pages        = {13--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSF.2009.15},
  doi          = {10.1109/CSF.2009.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MauwRD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/Dashti09,
  author       = {Mohammad Torabi Dashti},
  editor       = {Rachid Guerraoui and
                  Franck Petit},
  title        = {Optimistic Fair Exchange Using Trusted Devices},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems, 11th International
                  Symposium, {SSS} 2009, Lyon, France, November 3-6, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5873},
  pages        = {711--725},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05118-0\_49},
  doi          = {10.1007/978-3-642-05118-0\_49},
  timestamp    = {Wed, 07 Dec 2022 23:13:25 +0100},
  biburl       = {https://dblp.org/rec/conf/sss/Dashti09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0903-4358,
  author       = {Muhammad Torabi Dashti},
  title        = {Sums of powers via integration},
  journal      = {CoRR},
  volume       = {abs/0903.4358},
  year         = {2009},
  url          = {http://arxiv.org/abs/0903.4358},
  eprinttype    = {arXiv},
  eprint       = {0903.4358},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0903-4358.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/DashtiNJ08,
  author       = {Muhammad Torabi Dashti and
                  Srijith Krishnan Nair and
                  Hugo L. Jonker},
  title        = {Nuovo {DRM} Paradiso: Designing a Secure, Verified, Fair Exchange
                  {DRM} Scheme},
  journal      = {Fundam. Informaticae},
  volume       = {89},
  number       = {4},
  pages        = {393--417},
  year         = {2008},
  url          = {http://content.iospress.com/articles/fundamenta-informaticae/fi89-4-03},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/DashtiNJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictac/OrzanD08,
  author       = {Simona Orzan and
                  Muhammad Torabi Dashti},
  editor       = {John S. Fitzgerald and
                  Anne E. Haxthausen and
                  H{\"{u}}sn{\"{u}} Yenig{\"{u}}n},
  title        = {Fair Exchange Is Incomparable to Consensus},
  booktitle    = {Theoretical Aspects of Computing - {ICTAC} 2008, 5th International
                  Colloquium, Istanbul, Turkey, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5160},
  pages        = {349--363},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85762-4\_24},
  doi          = {10.1007/978-3-540-85762-4\_24},
  timestamp    = {Fri, 28 Feb 2020 14:02:33 +0100},
  biburl       = {https://dblp.org/rec/conf/ictac/OrzanD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/OrzanD08,
  author       = {Simona Orzan and
                  Muhammad Torabi Dashti},
  editor       = {Gadi Taubenfeld},
  title        = {Data Failures},
  booktitle    = {Distributed Computing, 22nd International Symposium, {DISC} 2008,
                  Arcachon, France, September 22-24, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5218},
  pages        = {514--515},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87779-0\_42},
  doi          = {10.1007/978-3-540-87779-0\_42},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/OrzanD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/CederquistDM07,
  author       = {Jan Cederquist and
                  Muhammad Torabi Dashti and
                  Sjouke Mauw},
  title        = {A Certified Email Protocol Using Key Chains},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {525--530},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.10},
  doi          = {10.1109/AINAW.2007.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/CederquistDM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asian/DashtiW07,
  author       = {Muhammad Torabi Dashti and
                  Yanjing Wang},
  editor       = {Iliano Cervesato},
  title        = {Risk Balance in Exchange Protocols},
  booktitle    = {Advances in Computer Science - {ASIAN} 2007. Computer and Network
                  Security, 12th Asian Computing Science Conference, Doha, Qatar, December
                  9-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4846},
  pages        = {70--77},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76929-3\_8},
  doi          = {10.1007/978-3-540-76929-3\_8},
  timestamp    = {Thu, 10 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asian/DashtiW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atva/DashtiW07,
  author       = {Muhammad Torabi Dashti and
                  Anton Wijs},
  editor       = {Kedar S. Namjoshi and
                  Tomohiro Yoneda and
                  Teruo Higashino and
                  Yoshio Okamura},
  title        = {Pruning State Spaces with Extended Beam Search},
  booktitle    = {Automated Technology for Verification and Analysis, 5th International
                  Symposium, {ATVA} 2007, Tokyo, Japan, October 22-25, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4762},
  pages        = {543--552},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75596-8\_39},
  doi          = {10.1007/978-3-540-75596-8\_39},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/atva/DashtiW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsen/DashtiNJ07,
  author       = {Muhammad Torabi Dashti and
                  Srijith Krishnan Nair and
                  Hugo L. Jonker},
  editor       = {Farhad Arbab and
                  Marjan Sirjani},
  title        = {Nuovo {DRM} Paradiso: Towards a Verified Fair {DRM} Scheme},
  booktitle    = {International Symposium on Fundamentals of Software Engineering, International
                  Symposium, {FSEN} 2007, Tehran, Iran, April 17-19, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4767},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75698-9\_3},
  doi          = {10.1007/978-3-540-75698-9\_3},
  timestamp    = {Tue, 14 May 2019 10:00:43 +0200},
  biburl       = {https://dblp.org/rec/conf/fsen/DashtiNJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NairDCT07,
  author       = {Srijith Krishnan Nair and
                  Muhammad Torabi Dashti and
                  Bruno Crispo and
                  Andrew S. Tanenbaum},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {A Hybrid {PKI-IBC} Based Ephemerizer System},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_21},
  doi          = {10.1007/978-0-387-72367-9\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NairDCT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/BlomCLOPPDW07,
  author       = {Stefan Blom and
                  Jens R. Calam{\'{e}} and
                  Bert Lisser and
                  Simona Orzan and
                  Jun Pang and
                  Jaco van de Pol and
                  Muhammad Torabi Dashti and
                  Anton Wijs},
  editor       = {Orna Grumberg and
                  Michael Huth},
  title        = {Distributed Analysis with \emph{mu} {CRL:} {A} Compendium of Case
                  Studies},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems,
                  13th International Conference, {TACAS} 2007, Held as Part of the Joint
                  European Conferences on Theory and Practice of Software, {ETAPS} 2007
                  Braga, Portugal, March 24 - April 1, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4424},
  pages        = {683--689},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71209-1\_53},
  doi          = {10.1007/978-3-540-71209-1\_53},
  timestamp    = {Mon, 11 Sep 2023 15:43:49 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/BlomCLOPPDW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ChothiaPD07,
  author       = {Tom Chothia and
                  Jun Pang and
                  Muhammad Torabi Dashti},
  editor       = {Alessandro Aldini and
                  Franck van Breugel},
  title        = {Keeping Secrets in Resource Aware Components},
  booktitle    = {Proceedings of the Fifth Workshop on Quantitative Aspects of Programming
                  Languages, {QAPL} 2007, Braga, Portugal, March 24-25, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {190},
  number       = {3},
  pages        = {79--94},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.07.006},
  doi          = {10.1016/J.ENTCS.2007.07.006},
  timestamp    = {Fri, 20 Jan 2023 13:40:20 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/ChothiaPD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DashtiWL08,
  author       = {Muhammad Torabi Dashti and
                  Anton Wijs and
                  Bert Lisser},
  editor       = {Ivana Cern{\'{a}} and
                  Boudewijn R. Haverkort},
  title        = {Distributed Partial Order Reduction for Security Protocols},
  booktitle    = {Proceedings of the 6th International Workshop on Parallel and Distributed
                  Methods in verifiCation, PDMC@CAV 2007, Berlin, Germany, July 8, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {198},
  number       = {1},
  pages        = {93--99},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2007.10.022},
  doi          = {10.1016/J.ENTCS.2007.10.022},
  timestamp    = {Mon, 13 Feb 2023 09:23:30 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DashtiWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CederquistD06,
  author       = {Jan Cederquist and
                  Muhammad Torabi Dashti},
  editor       = {Marianne Winslett and
                  Andrew D. Gordon and
                  David Sands},
  title        = {An intruder model for verifying liveness in security protocols},
  booktitle    = {Proceedings of the 2006 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180337.1180340},
  doi          = {10.1145/1180337.1180340},
  timestamp    = {Mon, 14 Feb 2022 09:20:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CederquistD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tgc/ChothiaOPD06,
  author       = {Tom Chothia and
                  Simona Orzan and
                  Jun Pang and
                  Muhammad Torabi Dashti},
  editor       = {Ugo Montanari and
                  Donald Sannella and
                  Roberto Bruni},
  title        = {A Framework for Automatically Checking Anonymity with \emph{mu} {CRL}},
  booktitle    = {Trustworthy Global Computing, Second Symposium, {TGC} 2006, Lucca,
                  Italy, November 7-9, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4661},
  pages        = {301--318},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-75336-0\_19},
  doi          = {10.1007/978-3-540-75336-0\_19},
  timestamp    = {Sat, 31 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tgc/ChothiaOPD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/CederquistCD05,
  author       = {J. G. Cederquist and
                  Ricardo Corin and
                  Muhammad Torabi Dashti},
  editor       = {Sihan Qing and
                  Wenbo Mao and
                  Javier L{\'{o}}pez and
                  Guilin Wang},
  title        = {On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation
                  Protocol},
  booktitle    = {Information and Communications Security, 7th International Conference,
                  {ICICS} 2005, Beijing, China, December 10-13, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3783},
  pages        = {27--39},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11602897\_3},
  doi          = {10.1007/11602897\_3},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/CederquistCD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzIEEE/Dashti04,
  author       = {Muhammad Torabi Dashti},
  title        = {A fuzzy automaton for control applications},
  booktitle    = {{IEEE} International Conference on Fuzzy Systems, {FUZZ-IEEE} 2004,
                  Budapest, Hungary, July 25-29, 2004},
  pages        = {505--509},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/FUZZY.2004.1375782},
  doi          = {10.1109/FUZZY.2004.1375782},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/fuzzIEEE/Dashti04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/CederquistD04,
  author       = {Jan Cederquist and
                  Muhammad Torabi Dashti},
  editor       = {Theodosis Dimitrakos and
                  Fabio Martinelli},
  title        = {Formal Analysis of a Fair Payment Protocol},
  booktitle    = {Formal Aspects in Security and Trust: Second {IFIP} {TC1} {WG1.7}
                  Workshop on Formal Aspects in Security and Trust (FAST), an event
                  of the 18th {IFIP} World Computer Congress, August 22-27, 2004, Toulouse,
                  France},
  series       = {{IFIP}},
  volume       = {173},
  pages        = {41--54},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24098-5\_4},
  doi          = {10.1007/0-387-24098-5\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/CederquistD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics