Search the dblp DataBase
Stephen H. Brackin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stephen H. Brackin Using Checkable Types in Automatic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:99-108 [Conf ] Randall W. Lichota , Grace L. Hammonds , Stephen H. Brackin Verifying The Correctness Of Cryptographic Protocols Using "Convince". [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:117-128 [Conf ] Stephen H. Brackin A HOL extension of GNY for automatically analyzing cryptographic protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:62-0 [Conf ] Stephen H. Brackin Evaluating and Improving Protocol Analysis by Automatic Proof. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:138-152 [Conf ] Stephen H. Brackin Implementing Effective Automatic Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ASE, 1999, pp:319-322 [Conf ] Stephen H. Brackin An Interface Specification Language for Automatically Analyzing Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] NDSS, 1997, pp:- [Conf ] Stephen H. Brackin Providing Tractable Security Analysis in HOL. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1994, pp:65-80 [Conf ] Stephen H. Brackin Deciding Cryptographic Protocol Adequacy with HOL. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1995, pp:90-105 [Conf ] Stephen H. Brackin Deciding Cryptographic Protocol Adequacy with HOL: The Implementation. [Citation Graph (0, 0)][DBLP ] TPHOLs, 1996, pp:61-76 [Conf ] Stephen H. Brackin , Shiu-Kai Chin Server-Process Restrictiveness in HOL. [Citation Graph (0, 0)][DBLP ] HUG, 1993, pp:450-463 [Conf ] Search in 0.001secs, Finished in 0.002secs