2018 share record
persistent URL:
Matthew S. Bauer , Rohit Chadha , A. Prasad Sistla , Mahesh Viswanathan : Model Checking Indistinguishability of Randomized Security Protocols. CAV (2) 2018 : 117-135 share record
persistent URL:
A. Prasad Sistla : Model Checking Randomized Security Protocols (Invited Paper). FSTTCS 2018 : 2:1-2:1 share record
persistent URL:
David A. Basin , Cas Cremers , Catherine Meadows : Model Checking Security Protocols. Handbook of Model Checking 2018 : 727-762 2016 export record
dblp key:
journals/isecure/PourpounehR16 share record
persistent URL:
Mohsen Pourpouneh , Rasoul Ramezanian : A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving. ISC Int. J. Inf. Secur. 8 (1 ) : 3-24 (2016 )share record
persistent URL:
Zohreh Saffarian Eidgahi , Vahid Rafe : Security analysis of network protocols through model checking: a case study on mobile IPv6. Secur. Commun. Networks 9 (10 ) : 1072-1084 (2016 )export record
dblp key:
conf/cn/Siedlecka-Lamch16 share record
persistent URL:
Olga Siedlecka-Lamch , Miroslaw Kurkowski , Jacek Piatkowski : Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption. CN 2016 : 107-117 2015 share record
persistent URL:
Mihai-Lica Pura , Didier Buchs : Symbolic Model Checking of Security Protocols for Ad hoc Networks on any Topologies. Trans. Petri Nets Other Model. Concurr. 10 : 109-130 (2015 )2013 share record
persistent URL:
Miroslaw Kurkowski , Olga Siedlecka-Lamch , Sabina Szymoniak , Henryk Piech : Parallel Bounded Model Checking of Security Protocols. PPAM (1) 2013 : 224-234 2012 share record
persistent URL:
Michaël Guedj : BSP Algorithms for LTL & CTL* Model Checking of Security Protocols. (Algorithmes BSP pour la vérification de modèles LTL et CTL* pour les protocoles de sécurité). University of Paris-Est, France, 2012 share record
persistent URL:
Alessandro Armando , Giancarlo Pellegrino , Roberto Carbone , Alessio Merlo , Davide Balzarotti : From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap. TAP@TOOLS 2012 : 3-18 export record
dblp key:
reference/crc/KurkowskiP12 share record
persistent URL:
Miroslaw Kurkowski , Wojciech Penczek : Applying Timed Automata to Model Checking of Security Protocols. Handbook of Finite State Based Models and Applications 2012 : 223-254 2011 share record
persistent URL:
Qurat ul Ain Nizamani : Directed symbolic model checking of security protocols. University of Leicester, UK, 2011 share record
persistent URL:
Roberto Carbone : LTL model-checking for security protocols. AI Commun. 24 (3 ) : 281-283 (2011 )export record
dblp key:
journals/scn/BasagiannisKP11 share record
persistent URL:
Stylianos Basagiannis , Panagiotis Katsaros , Andrew Pombortsis : Synthesis of attack actions using model checking for the verification of security protocols. Secur. Commun. Networks 4 (2 ) : 147-161 (2011 )2010 export record
dblp key:
journals/compsec/BasagiannisKP10 share record
persistent URL:
Stylianos Basagiannis , Panagiotis Katsaros , Andrew Pombortsis : An intruder model with message inspection for model checking security protocols. Comput. Secur. 29 (1 ) : 16-34 (2010 )2009 export record
dblp key:
journals/fuin/KurkowskiP09 share record
persistent URL:
Miroslaw Kurkowski , Wojciech Penczek : Timed Automata Based Model Checking of Timed Security Protocols. Fundam. Informaticae 93 (1-3 ) : 245-259 (2009 )export record
dblp key:
journals/jancl/ArmandoCC09 share record
persistent URL:
Alessandro Armando , Roberto Carbone , Luca Compagna : LTL model checking for security protocols. J. Appl. Non Class. Logics 19 (4 ) : 403-429 (2009 )export record
dblp key:
journals/telsys/TobarraCCDC09 share record
persistent URL:
Llanos Tobarra , Diego Cazorla , Fernando Cuartero , Gregorio Díaz , María-Emilia Cambronero : Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK. Telecommun. Syst. 40 (3-4 ) : 91-99 (2009 )2008 export record
dblp key:
journals/fuin/LomuscioP08 share record
persistent URL:
Alessio Lomuscio , Wojciech Penczek : LDYIS: a Framework for Model Checking Security Protocols. Fundam. Informaticae 85 (1-4 ) : 359-375 (2008 )export record
dblp key:
journals/ijisec/ArmandoC08 share record
persistent URL:
Alessandro Armando , Luca Compagna : SAT-based model-checking for security protocols analysis. Int. J. Inf. Sec. 7 (1 ) : 3-32 (2008 )2007 export record
dblp key:
journals/fuin/JakubowskaP07 share record
persistent URL:
Gizela Jakubowska , Wojciech Penczek : Modelling and Checking Timed Authentication of Security Protocols. Fundam. Informaticae 79 (3-4 ) : 363-378 (2007 )share record
persistent URL:
Alessandro Armando , Roberto Carbone , Luca Compagna : LTL Model Checking for Security Protocols. CSF 2007 : 385-396 share record
persistent URL:
Pedro Baltazar , Rohit Chadha , Paulo Mateus , Amílcar Sernadas : Towards Model-Checking Quantum Security Protocols. ICQNM 2007 : 14 export record
dblp key:
conf/ifip6-8/TobarraCCDC07 share record
persistent URL:
Llanos Tobarra , Diego Cazorla , Fernando Cuartero , Gregorio Díaz , María-Emilia Cambronero : Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP. WSAN 2007 : 95-106 2004 share record
persistent URL:
Ricardo Corin , Sandro Etalle , Pieter H. Hartel , Angelika Mader : Timed model checking of security protocols. FMSE 2004 : 23-32 export record
dblp key:
journals/entcs/ArmandoC05 share record
persistent URL:
Alessandro Armando , Luca Compagna : An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols. ARSPA@IJCAR 2004 : 91-108 2003 share record
persistent URL:
Alessandro Armando , Luca Compagna , Pierre Ganty : SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis. FME 2003 : 875-893 share record
persistent URL:
Kyoil Kim , Jacob A. Abraham , Jayanta Bhadra : Model Checking of Security Protocols with Pre-configuration. WISA 2003 : 1-15 2001 2000 export record
dblp key:
conf/forte/BenerecettiGPS00 share record
persistent URL:
Massimo Benerecetti , Fausto Giunchiglia , Maurizio Panti , Luca Spalazzi : A Logic of Belief and a Model Checking Algorithm for Security Protocols. FORTE 2000 : 393-408