Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "Model Checking Security Protocols"
@inproceedings{DBLP:conf/cav/BauerCS018, author = {Matthew S. Bauer and Rohit Chadha and A. Prasad Sistla and Mahesh Viswanathan}, title = {Model Checking Indistinguishability of Randomized Security Protocols}, booktitle = {{CAV} {(2)}}, series = {Lecture Notes in Computer Science}, volume = {10982}, pages = {117--135}, publisher = {Springer}, year = {2018} }
@inproceedings{DBLP:conf/fsttcs/Sistla18, author = {A. Prasad Sistla}, title = {Model Checking Randomized Security Protocols (Invited Paper)}, booktitle = {{FSTTCS}}, series = {LIPIcs}, volume = {122}, pages = {2:1--2:1}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018} }
@incollection{DBLP:reference/mc/BasinCM18, author = {David A. Basin and Cas Cremers and Catherine Meadows}, title = {Model Checking Security Protocols}, booktitle = {Handbook of Model Checking}, pages = {727--762}, publisher = {Springer}, year = {2018} }
@article{DBLP:journals/isecure/PourpounehR16, author = {Mohsen Pourpouneh and Rasoul Ramezanian}, title = {A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {8}, number = {1}, pages = {3--24}, year = {2016} }
@article{DBLP:journals/scn/EidgahiR16, author = {Zohreh Saffarian Eidgahi and Vahid Rafe}, title = {Security analysis of network protocols through model checking: a case study on mobile IPv6}, journal = {Secur. Commun. Networks}, volume = {9}, number = {10}, pages = {1072--1084}, year = {2016} }
@inproceedings{DBLP:conf/cn/Siedlecka-Lamch16, author = {Olga Siedlecka{-}Lamch and Miroslaw Kurkowski and Jacek Piatkowski}, title = {Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption}, booktitle = {{CN}}, series = {Communications in Computer and Information Science}, volume = {608}, pages = {107--117}, publisher = {Springer}, year = {2016} }
@article{DBLP:journals/topnoc/PuraB15, author = {Mihai{-}Lica Pura and Didier Buchs}, title = {Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies}, journal = {Trans. Petri Nets Other Model. Concurr.}, volume = {10}, pages = {109--130}, year = {2015} }
@inproceedings{DBLP:conf/ppam/KurkowskiSSP13, author = {Miroslaw Kurkowski and Olga Siedlecka{-}Lamch and Sabina Szymoniak and Henryk Piech}, title = {Parallel Bounded Model Checking of Security Protocols}, booktitle = {{PPAM} {(1)}}, series = {Lecture Notes in Computer Science}, volume = {8384}, pages = {224--234}, publisher = {Springer}, year = {2013} }
@phdthesis{DBLP:phd/hal/Guedj12, author = {Micha{\"{e}}l Guedj}, title = {{BSP} Algorithms for {LTL} {\&} CTL* Model Checking of Security Protocols. (Algorithmes {BSP} pour la v{\'{e}}rification de mod{\`{e}}les {LTL} et CTL* pour les protocoles de s{\'{e}}curit{\'{e}})}, school = {University of Paris-Est, France}, year = {2012} }
@inproceedings{DBLP:conf/tap/ArmandoPCMB12, author = {Alessandro Armando and Giancarlo Pellegrino and Roberto Carbone and Alessio Merlo and Davide Balzarotti}, title = {From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap}, booktitle = {TAP@TOOLS}, series = {Lecture Notes in Computer Science}, volume = {7305}, pages = {3--18}, publisher = {Springer}, year = {2012} }
@incollection{DBLP:reference/crc/KurkowskiP12, author = {Miroslaw Kurkowski and Wojciech Penczek}, title = {Applying Timed Automata to Model Checking of Security Protocols}, booktitle = {Handbook of Finite State Based Models and Applications}, pages = {223--254}, publisher = {Chapman and Hall/CRC}, year = {2012} }
@phdthesis{DBLP:phd/ethos/Nizamani11, author = {Qurat ul Ain Nizamani}, title = {Directed symbolic model checking of security protocols}, school = {University of Leicester, {UK}}, year = {2011} }
@article{DBLP:journals/aicom/Carbone11, author = {Roberto Carbone}, title = {{LTL} model-checking for security protocols}, journal = {{AI} Commun.}, volume = {24}, number = {3}, pages = {281--283}, year = {2011} }
@article{DBLP:journals/scn/BasagiannisKP11, author = {Stylianos Basagiannis and Panagiotis Katsaros and Andrew Pombortsis}, title = {Synthesis of attack actions using model checking for the verification of security protocols}, journal = {Secur. Commun. Networks}, volume = {4}, number = {2}, pages = {147--161}, year = {2011} }
@article{DBLP:journals/compsec/BasagiannisKP10, author = {Stylianos Basagiannis and Panagiotis Katsaros and Andrew Pombortsis}, title = {An intruder model with message inspection for model checking security protocols}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {16--34}, year = {2010} }
@article{DBLP:journals/fuin/KurkowskiP09, author = {Miroslaw Kurkowski and Wojciech Penczek}, title = {Timed Automata Based Model Checking of Timed Security Protocols}, journal = {Fundam. Informaticae}, volume = {93}, number = {1-3}, pages = {245--259}, year = {2009} }
@article{DBLP:journals/jancl/ArmandoCC09, author = {Alessandro Armando and Roberto Carbone and Luca Compagna}, title = {{LTL} model checking for security protocols}, journal = {J. Appl. Non Class. Logics}, volume = {19}, number = {4}, pages = {403--429}, year = {2009} }
@article{DBLP:journals/telsys/TobarraCCDC09, author = {Llanos Tobarra and Diego Cazorla and Fernando Cuartero and Gregorio D{\'{\i}}az and Mar{\'{\i}}a{-}Emilia Cambronero}, title = {Model checking wireless sensor network security protocols: TinySec + {LEAP} + TinyPK}, journal = {Telecommun. Syst.}, volume = {40}, number = {3-4}, pages = {91--99}, year = {2009} }
@article{DBLP:journals/fuin/LomuscioP08, author = {Alessio Lomuscio and Wojciech Penczek}, title = {{LDYIS:} a Framework for Model Checking Security Protocols}, journal = {Fundam. Informaticae}, volume = {85}, number = {1-4}, pages = {359--375}, year = {2008} }
@article{DBLP:journals/ijisec/ArmandoC08, author = {Alessandro Armando and Luca Compagna}, title = {SAT-based model-checking for security protocols analysis}, journal = {Int. J. Inf. Sec.}, volume = {7}, number = {1}, pages = {3--32}, year = {2008} }
@article{DBLP:journals/fuin/JakubowskaP07, author = {Gizela Jakubowska and Wojciech Penczek}, title = {Modelling and Checking Timed Authentication of Security Protocols}, journal = {Fundam. Informaticae}, volume = {79}, number = {3-4}, pages = {363--378}, year = {2007} }
@inproceedings{DBLP:conf/csfw/ArmandoCC07, author = {Alessandro Armando and Roberto Carbone and Luca Compagna}, title = {{LTL} Model Checking for Security Protocols}, booktitle = {{CSF}}, pages = {385--396}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/icqnm/BaltazarCMS07, author = {Pedro Baltazar and Rohit Chadha and Paulo Mateus and Am{\'{\i}}lcar Sernadas}, title = {Towards Model-Checking Quantum Security Protocols}, booktitle = {{ICQNM}}, pages = {14}, publisher = {{IEEE} Computer Society}, year = {2007} }
@inproceedings{DBLP:conf/ifip6-8/TobarraCCDC07, author = {Llanos Tobarra and Diego Cazorla and Fernando Cuartero and Gregorio D{\'{\i}}az and Mar{\'{\i}}a{-}Emilia Cambronero}, title = {Model Checking Wireless Sensor Network Security Protocols: TinySec + {LEAP}}, booktitle = {{WSAN}}, series = {{IFIP}}, volume = {248}, pages = {95--106}, publisher = {Springer}, year = {2007} }
@inproceedings{DBLP:conf/ccs/CorinEHM04, author = {Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Angelika Mader}, title = {Timed model checking of security protocols}, booktitle = {{FMSE}}, pages = {23--32}, publisher = {{ACM}}, year = {2004} }
@inproceedings{DBLP:journals/entcs/ArmandoC05, author = {Alessandro Armando and Luca Compagna}, title = {An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols}, booktitle = {ARSPA@IJCAR}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {91--108}, publisher = {Elsevier}, year = {2004} }
@inproceedings{DBLP:conf/fm/ArmandoCG03, author = {Alessandro Armando and Luca Compagna and Pierre Ganty}, title = {SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis}, booktitle = {{FME}}, series = {Lecture Notes in Computer Science}, volume = {2805}, pages = {875--893}, publisher = {Springer}, year = {2003} }
@inproceedings{DBLP:conf/wisa/KimAB03, author = {Kyoil Kim and Jacob A. Abraham and Jayanta Bhadra}, title = {Model Checking of Security Protocols with Pre-configuration}, booktitle = {{WISA}}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {1--15}, publisher = {Springer}, year = {2003} }
@phdthesis{DBLP:phd/ethos/Broadfoot01, author = {Philippa J. Broadfoot}, title = {Data independence in the model checking of security protocols}, school = {University of Oxford, {UK}}, year = {2001} }
@inproceedings{DBLP:conf/forte/BenerecettiGPS00, author = {Massimo Benerecetti and Fausto Giunchiglia and Maurizio Panti and Luca Spalazzi}, title = {A Logic of Belief and a Model Checking Algorithm for Security Protocols}, booktitle = {{FORTE}}, series = {{IFIP} Conference Proceedings}, volume = {183}, pages = {393--408}, publisher = {Kluwer}, year = {2000} }
@inproceedings{DBLP:conf/tacas/BenerecettiG00, author = {Massimo Benerecetti and Fausto Giunchiglia}, title = {Model Checking Security Protocols Using a Logic of Belief}, booktitle = {{TACAS}}, series = {Lecture Notes in Computer Science}, volume = {1785}, pages = {519--534}, publisher = {Springer}, year = {2000} }
@article{DBLP:journals/jcs/Lowe99, author = {Gavin Lowe}, title = {Towards a Completeness Result for Model Checking of Security Protocols}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {89--146}, year = {1999} }
@inproceedings{DBLP:conf/csfw/Lowe98, author = {Gavin Lowe}, title = {Towards a Completeness Result for Model Checking of Security Protocols}, booktitle = {{CSFW}}, pages = {96--105}, publisher = {{IEEE} Computer Society}, year = {1998} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.