Search dblp for Publications

export results for "Model Checking Security Protocols"

 download as .bib file

@inproceedings{DBLP:conf/cav/BauerCS018,
  author       = {Matthew S. Bauer and
                  Rohit Chadha and
                  A. Prasad Sistla and
                  Mahesh Viswanathan},
  title        = {Model Checking Indistinguishability of Randomized Security Protocols},
  booktitle    = {{CAV} {(2)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10982},
  pages        = {117--135},
  publisher    = {Springer},
  year         = {2018}
}
@inproceedings{DBLP:conf/fsttcs/Sistla18,
  author       = {A. Prasad Sistla},
  title        = {Model Checking Randomized Security Protocols (Invited Paper)},
  booktitle    = {{FSTTCS}},
  series       = {LIPIcs},
  volume       = {122},
  pages        = {2:1--2:1},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2018}
}
@incollection{DBLP:reference/mc/BasinCM18,
  author       = {David A. Basin and
                  Cas Cremers and
                  Catherine Meadows},
  title        = {Model Checking Security Protocols},
  booktitle    = {Handbook of Model Checking},
  pages        = {727--762},
  publisher    = {Springer},
  year         = {2018}
}
@article{DBLP:journals/isecure/PourpounehR16,
  author       = {Mohsen Pourpouneh and
                  Rasoul Ramezanian},
  title        = {A short introduction to two approaches in formal verification of security
                  protocols: model checking and theorem proving},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {3--24},
  year         = {2016}
}
@article{DBLP:journals/scn/EidgahiR16,
  author       = {Zohreh Saffarian Eidgahi and
                  Vahid Rafe},
  title        = {Security analysis of network protocols through model checking: a case
                  study on mobile IPv6},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {10},
  pages        = {1072--1084},
  year         = {2016}
}
@inproceedings{DBLP:conf/cn/Siedlecka-Lamch16,
  author       = {Olga Siedlecka{-}Lamch and
                  Miroslaw Kurkowski and
                  Jacek Piatkowski},
  title        = {Probabilistic Model Checking of Security Protocols without Perfect
                  Cryptography Assumption},
  booktitle    = {{CN}},
  series       = {Communications in Computer and Information Science},
  volume       = {608},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2016}
}
@article{DBLP:journals/topnoc/PuraB15,
  author       = {Mihai{-}Lica Pura and
                  Didier Buchs},
  title        = {Symbolic Model Checking of Security Protocols for Ad hoc Networks
                  on any Topologies},
  journal      = {Trans. Petri Nets Other Model. Concurr.},
  volume       = {10},
  pages        = {109--130},
  year         = {2015}
}
@inproceedings{DBLP:conf/ppam/KurkowskiSSP13,
  author       = {Miroslaw Kurkowski and
                  Olga Siedlecka{-}Lamch and
                  Sabina Szymoniak and
                  Henryk Piech},
  title        = {Parallel Bounded Model Checking of Security Protocols},
  booktitle    = {{PPAM} {(1)}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8384},
  pages        = {224--234},
  publisher    = {Springer},
  year         = {2013}
}
@phdthesis{DBLP:phd/hal/Guedj12,
  author       = {Micha{\"{e}}l Guedj},
  title        = {{BSP} Algorithms for {LTL} {\&} CTL* Model Checking of Security
                  Protocols. (Algorithmes {BSP} pour la v{\'{e}}rification de mod{\`{e}}les
                  {LTL} et CTL* pour les protocoles de s{\'{e}}curit{\'{e}})},
  school       = {University of Paris-Est, France},
  year         = {2012}
}
@inproceedings{DBLP:conf/tap/ArmandoPCMB12,
  author       = {Alessandro Armando and
                  Giancarlo Pellegrino and
                  Roberto Carbone and
                  Alessio Merlo and
                  Davide Balzarotti},
  title        = {From Model-Checking to Automated Testing of Security Protocols: Bridging
                  the Gap},
  booktitle    = {TAP@TOOLS},
  series       = {Lecture Notes in Computer Science},
  volume       = {7305},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2012}
}
@incollection{DBLP:reference/crc/KurkowskiP12,
  author       = {Miroslaw Kurkowski and
                  Wojciech Penczek},
  title        = {Applying Timed Automata to Model Checking of Security Protocols},
  booktitle    = {Handbook of Finite State Based Models and Applications},
  pages        = {223--254},
  publisher    = {Chapman and Hall/CRC},
  year         = {2012}
}
@phdthesis{DBLP:phd/ethos/Nizamani11,
  author       = {Qurat ul Ain Nizamani},
  title        = {Directed symbolic model checking of security protocols},
  school       = {University of Leicester, {UK}},
  year         = {2011}
}
@article{DBLP:journals/aicom/Carbone11,
  author       = {Roberto Carbone},
  title        = {{LTL} model-checking for security protocols},
  journal      = {{AI} Commun.},
  volume       = {24},
  number       = {3},
  pages        = {281--283},
  year         = {2011}
}
@article{DBLP:journals/scn/BasagiannisKP11,
  author       = {Stylianos Basagiannis and
                  Panagiotis Katsaros and
                  Andrew Pombortsis},
  title        = {Synthesis of attack actions using model checking for the verification
                  of security protocols},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {2},
  pages        = {147--161},
  year         = {2011}
}
@article{DBLP:journals/compsec/BasagiannisKP10,
  author       = {Stylianos Basagiannis and
                  Panagiotis Katsaros and
                  Andrew Pombortsis},
  title        = {An intruder model with message inspection for model checking security
                  protocols},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {16--34},
  year         = {2010}
}
@article{DBLP:journals/fuin/KurkowskiP09,
  author       = {Miroslaw Kurkowski and
                  Wojciech Penczek},
  title        = {Timed Automata Based Model Checking of Timed Security Protocols},
  journal      = {Fundam. Informaticae},
  volume       = {93},
  number       = {1-3},
  pages        = {245--259},
  year         = {2009}
}
@article{DBLP:journals/jancl/ArmandoCC09,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna},
  title        = {{LTL} model checking for security protocols},
  journal      = {J. Appl. Non Class. Logics},
  volume       = {19},
  number       = {4},
  pages        = {403--429},
  year         = {2009}
}
@article{DBLP:journals/telsys/TobarraCCDC09,
  author       = {Llanos Tobarra and
                  Diego Cazorla and
                  Fernando Cuartero and
                  Gregorio D{\'{\i}}az and
                  Mar{\'{\i}}a{-}Emilia Cambronero},
  title        = {Model checking wireless sensor network security protocols: TinySec
                  + {LEAP} + TinyPK},
  journal      = {Telecommun. Syst.},
  volume       = {40},
  number       = {3-4},
  pages        = {91--99},
  year         = {2009}
}
@article{DBLP:journals/fuin/LomuscioP08,
  author       = {Alessio Lomuscio and
                  Wojciech Penczek},
  title        = {{LDYIS:} a Framework for Model Checking Security Protocols},
  journal      = {Fundam. Informaticae},
  volume       = {85},
  number       = {1-4},
  pages        = {359--375},
  year         = {2008}
}
@article{DBLP:journals/ijisec/ArmandoC08,
  author       = {Alessandro Armando and
                  Luca Compagna},
  title        = {SAT-based model-checking for security protocols analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {7},
  number       = {1},
  pages        = {3--32},
  year         = {2008}
}
@article{DBLP:journals/fuin/JakubowskaP07,
  author       = {Gizela Jakubowska and
                  Wojciech Penczek},
  title        = {Modelling and Checking Timed Authentication of Security Protocols},
  journal      = {Fundam. Informaticae},
  volume       = {79},
  number       = {3-4},
  pages        = {363--378},
  year         = {2007}
}
@inproceedings{DBLP:conf/csfw/ArmandoCC07,
  author       = {Alessandro Armando and
                  Roberto Carbone and
                  Luca Compagna},
  title        = {{LTL} Model Checking for Security Protocols},
  booktitle    = {{CSF}},
  pages        = {385--396},
  publisher    = {{IEEE} Computer Society},
  year         = {2007}
}
@inproceedings{DBLP:conf/icqnm/BaltazarCMS07,
  author       = {Pedro Baltazar and
                  Rohit Chadha and
                  Paulo Mateus and
                  Am{\'{\i}}lcar Sernadas},
  title        = {Towards Model-Checking Quantum Security Protocols},
  booktitle    = {{ICQNM}},
  pages        = {14},
  publisher    = {{IEEE} Computer Society},
  year         = {2007}
}
@inproceedings{DBLP:conf/ifip6-8/TobarraCCDC07,
  author       = {Llanos Tobarra and
                  Diego Cazorla and
                  Fernando Cuartero and
                  Gregorio D{\'{\i}}az and
                  Mar{\'{\i}}a{-}Emilia Cambronero},
  title        = {Model Checking Wireless Sensor Network Security Protocols: TinySec
                  + {LEAP}},
  booktitle    = {{WSAN}},
  series       = {{IFIP}},
  volume       = {248},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2007}
}
@inproceedings{DBLP:conf/ccs/CorinEHM04,
  author       = {Ricardo Corin and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Angelika Mader},
  title        = {Timed model checking of security protocols},
  booktitle    = {{FMSE}},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2004}
}
@inproceedings{DBLP:journals/entcs/ArmandoC05,
  author       = {Alessandro Armando and
                  Luca Compagna},
  title        = {An Optimized Intruder Model for SAT-based Model-Checking of Security
                  Protocols},
  booktitle    = {ARSPA@IJCAR},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {91--108},
  publisher    = {Elsevier},
  year         = {2004}
}
@inproceedings{DBLP:conf/fm/ArmandoCG03,
  author       = {Alessandro Armando and
                  Luca Compagna and
                  Pierre Ganty},
  title        = {SAT-Based Model-Checking of Security Protocols Using Planning Graph
                  Analysis},
  booktitle    = {{FME}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2805},
  pages        = {875--893},
  publisher    = {Springer},
  year         = {2003}
}
@inproceedings{DBLP:conf/wisa/KimAB03,
  author       = {Kyoil Kim and
                  Jacob A. Abraham and
                  Jayanta Bhadra},
  title        = {Model Checking of Security Protocols with Pre-configuration},
  booktitle    = {{WISA}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2003}
}
@phdthesis{DBLP:phd/ethos/Broadfoot01,
  author       = {Philippa J. Broadfoot},
  title        = {Data independence in the model checking of security protocols},
  school       = {University of Oxford, {UK}},
  year         = {2001}
}
@inproceedings{DBLP:conf/forte/BenerecettiGPS00,
  author       = {Massimo Benerecetti and
                  Fausto Giunchiglia and
                  Maurizio Panti and
                  Luca Spalazzi},
  title        = {A Logic of Belief and a Model Checking Algorithm for Security Protocols},
  booktitle    = {{FORTE}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {183},
  pages        = {393--408},
  publisher    = {Kluwer},
  year         = {2000}
}
@inproceedings{DBLP:conf/tacas/BenerecettiG00,
  author       = {Massimo Benerecetti and
                  Fausto Giunchiglia},
  title        = {Model Checking Security Protocols Using a Logic of Belief},
  booktitle    = {{TACAS}},
  series       = {Lecture Notes in Computer Science},
  volume       = {1785},
  pages        = {519--534},
  publisher    = {Springer},
  year         = {2000}
}
@article{DBLP:journals/jcs/Lowe99,
  author       = {Gavin Lowe},
  title        = {Towards a Completeness Result for Model Checking of Security Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {89--146},
  year         = {1999}
}
@inproceedings{DBLP:conf/csfw/Lowe98,
  author       = {Gavin Lowe},
  title        = {Towards a Completeness Result for Model Checking of Security Protocols},
  booktitle    = {{CSFW}},
  pages        = {96--105},
  publisher    = {{IEEE} Computer Society},
  year         = {1998}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics