The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Muhammad Torabi Dashti: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw
    A Certified Email Protocol Using Key Chains. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:525-530 [Conf]
  2. Jan Cederquist, Muhammad Torabi Dashti
    An intruder model for verifying liveness in security protocols. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:23-32 [Conf]
  3. J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti
    On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:27-39 [Conf]
  4. Jan Cederquist, Muhammad Torabi Dashti
    Formal Analysis of a Fair Payment Protocol. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:41-54 [Conf]
  5. Mohammad Torabi Dashti, Yanjing Wang
    Risk Balance in Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    ASIAN, 2007, pp:70-77 [Conf]
  6. Muhammad Torabi Dashti, Anton Wijs
    Pruning State Spaces with Extended Beam Search. [Citation Graph (0, 0)][DBLP]
    ATVA, 2007, pp:543-552 [Conf]
  7. Stefan Blom, Jens R. Calame, Bert Lisser, Simona Orzan, Jun Pang, Jaco van de Pol, Muhammad Torabi Dashti, Anton Wijs
    Distributed Analysis with mu CRL: A Compendium of Case Studies. [Citation Graph (0, 0)][DBLP]
    TACAS, 2007, pp:683-689 [Conf]
  8. Muhammad Torabi Dashti, Srijith Krishnan Nair, Hugo L. Jonker
    Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme. [Citation Graph (0, 0)][DBLP]
    FSEN, 2007, pp:33-48 [Conf]
  9. Tom Chothia, Jun Pang, Muhammad Torabi Dashti
    Keeping Secrets in Resource Aware Components. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:190, n:3, pp:79-94 [Journal]

  10. Fair Exchange Is Incomparable to Consensus. [Citation Graph (, )][DBLP]


  11. A Hybrid PKI-IBC Based Ephemerizer System. [Citation Graph (, )][DBLP]


  12. A Framework for Automatically Checking Anonymity with mu CRL. [Citation Graph (, )][DBLP]


  13. Data Failures. [Citation Graph (, )][DBLP]


  14. Sums of powers via integration [Citation Graph (, )][DBLP]


  15. Distributed Partial Order Reduction for Security Protocols. [Citation Graph (, )][DBLP]


Search in 0.027secs, Finished in 0.028secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002