The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David A. Basin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David A. Basin
    Model Driven Security. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:4- [Conf]
  2. Ian Frank, David A. Basin, Alan Bundy
    Combining Knowledge and Search to Solve Single-Suit Bridge. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, 2000, pp:195-200 [Conf]
  3. Ian Frank, David A. Basin, Hitoshi Matsubara
    Finding Optimal Strategies for Imperfect Information Games. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, 1998, pp:500-507 [Conf]
  4. David A. Basin, Fausto Giunchiglia, Paolo Traverso
    Automating Meta-Theory Creation and System Extension. [Citation Graph (0, 0)][DBLP]
    AI*IA, 1991, pp:48-57 [Conf]
  5. Penny Anderson, David A. Basin
    Deriving and Applying Logic Program Transformers. [Citation Graph (0, 0)][DBLP]
    ASIAN, 1995, pp:301-318 [Conf]
  6. David A. Basin
    An Environment For Automated Reasoning About Partial Functions. [Citation Graph (0, 0)][DBLP]
    CADE, 1988, pp:101-110 [Conf]
  7. David A. Basin
    Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators in Isomorphism Complete. [Citation Graph (0, 0)][DBLP]
    CADE, 1990, pp:251-260 [Conf]
  8. David A. Basin, Seán Matthews
    Structuring Metatheory on Inductive Definitions. [Citation Graph (0, 0)][DBLP]
    CADE, 1996, pp:171-185 [Conf]
  9. David A. Basin, Toby Walsh
    Difference Matching. [Citation Graph (0, 0)][DBLP]
    CADE, 1992, pp:295-309 [Conf]
  10. David A. Basin, Toby Walsh
    Termination Orderings for Rippling. [Citation Graph (0, 0)][DBLP]
    CADE, 1994, pp:466-483 [Conf]
  11. David A. Basin, Stefan Friedrich, Joachim Posegga, Harald Vogt
    Java Bytecode Verification by Model Checking. [Citation Graph (0, 0)][DBLP]
    CAV, 1999, pp:491-494 [Conf]
  12. David A. Basin, Nils Klarlund
    Hardware Verification using Monadic Second-Order Logic. [Citation Graph (0, 0)][DBLP]
    CAV, 1995, pp:31-41 [Conf]
  13. Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron
    The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. [Citation Graph (0, 0)][DBLP]
    CAV, 2005, pp:281-285 [Conf]
  14. Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron
    The AVISS Security Protocol Analysis Tool. [Citation Graph (0, 0)][DBLP]
    CAV, 2002, pp:349-353 [Conf]
  15. Abdelwaheb Ayari, David A. Basin
    Bounded Model Construction for Monadic Second-Order Logics. [Citation Graph (0, 0)][DBLP]
    CAV, 2000, pp:99-112 [Conf]
  16. Abdelwaheb Ayari, David A. Basin, Felix Klaedtke
    Decision Procedures for Inductive Boolean Functions Based on Alternating Automata. [Citation Graph (0, 0)][DBLP]
    CAV, 2000, pp:170-185 [Conf]
  17. David A. Basin, Sebastian Mödersheim, Luca Viganò
    CDiff: a new reduction technique for constraint-based analysis of security protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:335-344 [Conf]
  18. David A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç
    Specifying and analyzing security automata using CSP-OZ. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:70-81 [Conf]
  19. Ian Frank, David A. Basin
    Optimal Play against Best Defence: Complexity and Heuristics. [Citation Graph (0, 0)][DBLP]
    Computers and Games, 1998, pp:50-73 [Conf]
  20. David A. Basin
    Lazy Infinite-State Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CQRE, 1999, pp:30-42 [Conf]
  21. Christoph Sprenger, Michael Backes, David A. Basin, Birgit Pfitzmann, Michael Waidner
    Cryptographically Sound Theorem Proving. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:153-166 [Conf]
  22. Abdelwaheb Ayari, David A. Basin, Andreas Podelski
    LISA: A Specification Language Based on WS2S. [Citation Graph (0, 0)][DBLP]
    CSL, 1997, pp:18-34 [Conf]
  23. David A. Basin, Toby Walsh
    A Calculus for Rippling. [Citation Graph (0, 0)][DBLP]
    CTRS, 1994, pp:15-30 [Conf]
  24. Ian Frank, David A. Basin, Alan Bundy
    An Adaptation of Proof-Planning to Declarer Play in Bridge. [Citation Graph (0, 0)][DBLP]
    ECAI, 1992, pp:72-76 [Conf]
  25. Tetsuya Yoshida, Alan Bundy, Ian Green, Toby Walsh, David A. Basin
    Coloured Rippling: An Extension of a Theorem Proving Heuristic. [Citation Graph (0, 0)][DBLP]
    ECAI, 1994, pp:85-89 [Conf]
  26. David A. Basin
    Building Theories in Nuprl. [Citation Graph (0, 0)][DBLP]
    Logic at Botik, 1989, pp:12-25 [Conf]
  27. Boris Köpf, David A. Basin
    Timing-Sensitive Information Flow Analysis for Synchronous Systems. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:243-262 [Conf]
  28. David A. Basin, Sebastian Mödersheim, Luca Viganò
    An On-the-Fly Model-Checker for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:253-270 [Conf]
  29. Manuel Hilty, David A. Basin, Alexander Pretschner
    On Obligations. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:98-117 [Conf]
  30. Paul E. Sevinç, David A. Basin, Ernst-Rüdiger Olderog
    Controlling Access to Documents: A Formal Access Control Model. [Citation Graph (0, 0)][DBLP]
    ETRICS, 2006, pp:352-367 [Conf]
  31. David A. Basin
    The Next 700 Synthesis Calculi. [Citation Graph (0, 0)][DBLP]
    FME, 2002, pp:430- [Conf]
  32. David A. Basin, Hironobu Kuruma, Kazuo Takaragi, Burkhart Wolff
    Verification of a Signature Architecture with HOL-Z. [Citation Graph (0, 0)][DBLP]
    FM, 2005, pp:269-285 [Conf]
  33. Abdelwaheb Ayari, David A. Basin
    QUBOS: Deciding Quantified Boolean Logic Using Propositional Satisfiability Solvers. [Citation Graph (0, 0)][DBLP]
    FMCAD, 2002, pp:187-201 [Conf]
  34. David A. Basin, Stefan Friedrich, Sebastian Mödersheim
    B2M: A Semantic Based Tool for BLIF Hardware Descriptions. [Citation Graph (0, 0)][DBLP]
    FMCAD, 2000, pp:91-107 [Conf]
  35. Francisco J. Cantu, Alan Bundy, Alan Smaill, David A. Basin
    Experiments in Automating Hardware Verification Using Inductive Proof Planning. [Citation Graph (0, 0)][DBLP]
    FMCAD, 1996, pp:94-108 [Conf]
  36. David A. Basin, Seán Matthews, Luca Viganò
    A Topography of Labelled Modal Logics. [Citation Graph (0, 0)][DBLP]
    Frontiers of Combining Systems (FroCos), 1996, pp:75-92 [Conf]
  37. David A. Basin, Manuel Clavel, José Meseguer
    Rewriting Logic as a Metalogical Framework. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 2000, pp:55-80 [Conf]
  38. David A. Basin, Seán Matthews
    A Conservative Extension of First-order Logic and Its Application to Theorem Proving. [Citation Graph (0, 0)][DBLP]
    FSTTCS, 1993, pp:151-160 [Conf]
  39. David A. Basin
    IsaWhelk Interpreted in Isabelle. [Citation Graph (0, 0)][DBLP]
    ICLP, 1994, pp:741- [Conf]
  40. Ina Kraan, David A. Basin, Alan Bundy
    Middle-Out Reasoning for Logic Program Synthesis. [Citation Graph (0, 0)][DBLP]
    ICLP, 1993, pp:441-455 [Conf]
  41. David A. Basin, Toby Walsh
    Difference Unification. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1993, pp:116-122 [Conf]
  42. Abdelwaheb Ayari, David A. Basin, Stefan Friedrich
    Structural and Behavioral Modeling with Monadic Logics. [Citation Graph (0, 0)][DBLP]
    ISMVL, 1999, pp:142-151 [Conf]
  43. David A. Basin, Alan Bundy, Ina Kraan, Seán Matthews
    A Framework for Program Development Based on Schematic Proof. [Citation Graph (0, 0)][DBLP]
    IWSSD, 1993, pp:162-171 [Conf]
  44. David A. Basin, Seán Matthews, Luca Viganò
    A New Method for Bounding the Complexity of Modal Logics. [Citation Graph (0, 0)][DBLP]
    Kurt Gödel Colloquium, 1997, pp:89-102 [Conf]
  45. David A. Basin, Seán Matthews, Luca Viganò
    Labelled Quantified Modal Logics. [Citation Graph (0, 0)][DBLP]
    KI, 1997, pp:171-182 [Conf]
  46. David A. Basin, Seán Matthews, Luca Viganò
    Implementing Modal and Relevance Logics in a Logical Framework. [Citation Graph (0, 0)][DBLP]
    KR, 1996, pp:386-397 [Conf]
  47. David A. Basin, Harald Ganzinger
    Complexity Analysis Based on Ordered Resolution. [Citation Graph (0, 0)][DBLP]
    LICS, 1996, pp:456-465 [Conf]
  48. David A. Basin
    Logic Frameworks for Logic Programs. [Citation Graph (0, 0)][DBLP]
    LOPSTR, 1994, pp:1-16 [Conf]
  49. David A. Basin, Yves Deville, Pierre Flener, Andreas Hamfelt, Jørgen Fischer Nilsson
    Synthesis of Programs in Computational Logic. [Citation Graph (0, 0)][DBLP]
    Program Development in Computational Logic, 2004, pp:30-65 [Conf]
  50. Ina Kraan, David A. Basin, Alan Bundy
    Logic Program Synthesis via Proof Planning. [Citation Graph (0, 0)][DBLP]
    LOPSTR, 1992, pp:1-14 [Conf]
  51. David A. Basin, Sebastian Mödersheim, Luca Viganò
    Algebraic Intruder Deductions. [Citation Graph (0, 0)][DBLP]
    LPAR, 2005, pp:549-564 [Conf]
  52. David A. Basin, Peter Del Vecchio
    Verification Of Combinational Logic in Nuprl. [Citation Graph (0, 0)][DBLP]
    Hardware Specification, Verification and Synthesis, 1989, pp:333-357 [Conf]
  53. Diana Senn, David A. Basin, Germano Caronni
    Firewall Conformance Testing. [Citation Graph (0, 0)][DBLP]
    TestCom, 2005, pp:226-241 [Conf]
  54. David A. Basin, Jürgen Doser, Torsten Lodderstedt
    Model driven security for process-oriented systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:100-109 [Conf]
  55. David A. Basin, Frank Rittinger, Luca Viganò
    A formal data-model of the CORBA security service. [Citation Graph (0, 0)][DBLP]
    ESEC / SIGSOFT FSE, 2001, pp:303-304 [Conf]
  56. David A. Basin, Stefan Friedrich, Marek Gawkowski, Joachim Posegga
    Bytecode Model Checking: An Experimental Analysis. [Citation Graph (0, 0)][DBLP]
    SPIN, 2002, pp:42-59 [Conf]
  57. Abdelwaheb Ayari, David A. Basin
    Generic System Support for Deductive Program Development. [Citation Graph (0, 0)][DBLP]
    TACAS, 1996, pp:313-328 [Conf]
  58. David A. Basin, Douglas J. Howe
    Some Normalization Properties of Martin-Löf's Type Theory, and Applications. [Citation Graph (0, 0)][DBLP]
    TACS, 1991, pp:475-494 [Conf]
  59. David A. Basin, Stefan Friedrich
    Modeling a Hardware Synthesis Methodology in Isabelle. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 1996, pp:33-50 [Conf]
  60. David A. Basin, Stefan Friedrich, Marek Gawkowski
    Verified Bytecode Model Checkers. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 2002, pp:47-66 [Conf]
  61. Torsten Lodderstedt, David A. Basin, Jürgen Doser
    SecureUML: A UML-Based Modeling Language for Model-Driven Security. [Citation Graph (0, 0)][DBLP]
    UML, 2002, pp:426-441 [Conf]
  62. David A. Basin, Frank Rittinger, Luca Viganò
    A Formal Analysis of the CORBA Security Service. [Citation Graph (0, 0)][DBLP]
    ZB, 2002, pp:330-349 [Conf]
  63. Ian Frank, David A. Basin
    Search in Games with Incomplete Information: A Case Study Using Bridge Card Play. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 1998, v:100, n:1-2, pp:87-123 [Journal]
  64. Richard Barnett, David A. Basin, Jane Hesketh
    A Recursion Planning Analysis of Inductive Completion. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 1993, v:8, n:3-4, pp:363-381 [Journal]
  65. Alexander Pretschner, Manuel Hilty, David A. Basin
    Distributed usage control. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2006, v:49, n:9, pp:39-44 [Journal]
  66. Rolf Oppliger, Ralf Hauser, David A. Basin
    SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:12, pp:2238-2246 [Journal]
  67. David A. Basin
    Logical-Framework-Based Program Development. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1998, v:30, n:3es, pp:1- [Journal]
  68. David A. Basin
    Generalized Rewriting in Type Theory. [Citation Graph (0, 0)][DBLP]
    Elektronische Informationsverarbeitung und Kybernetik, 1994, v:30, n:5/6, pp:249-259 [Journal]
  69. Rafael Accorsi, David A. Basin, Luca Viganò
    Towards an awareness-based semantics for security protocol analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:55, n:1, pp:- [Journal]
  70. David A. Basin, Grit Denker
    Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:36, n:, pp:- [Journal]
  71. David A. Basin, Seán Matthews
    Scoped metatheorems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1998, v:15, n:, pp:- [Journal]
  72. Carlos Caleiro, Luca Viganò, David A. Basin
    Metareasoning about Security Protocols using Distributed Temporal Logic. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:67-89 [Journal]
  73. Carlos Caleiro, Luca Viganò, David A. Basin
    Deconstructing Alice and Bob. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:135, n:1, pp:3-22 [Journal]
  74. David A. Basin, Stefan Friedrich
    Modeling a Hardware Synthesis Methodology in Isabelle. [Citation Graph (0, 0)][DBLP]
    Formal Methods in System Design, 1999, v:15, n:2, pp:99-122 [Journal]
  75. David A. Basin, Seán Matthews
    Structuring Metatheory on Inductive Definitions. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 2000, v:162, n:1-2, pp:80-95 [Journal]
  76. Carlos Caleiro, Luca Viganò, David A. Basin
    Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    Logic Journal of the IGPL, 2005, v:13, n:6, pp:637-663 [Journal]
  77. David A. Basin, Sebastian Mödersheim, Luca Viganò
    OFMC: A symbolic model checker for security protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:181-208 [Journal]
  78. Michael Näf, David A. Basin
    Konflikt oder Review zwei Ansätze für Labors in angewandter Informationssicherheit. [Citation Graph (0, 0)][DBLP]
    Informatik Spektrum, 2005, v:28, n:5, pp:407-412 [Journal]
  79. David A. Basin
    A Term Equality Problem Equivalent to Graph Isomorphism. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:51, n:2, pp:61-66 [Journal]
  80. David A. Basin, Harald Ganzinger
    Automated complexity analysis based on ordered resolution. [Citation Graph (0, 0)][DBLP]
    J. ACM, 2001, v:48, n:1, pp:70-109 [Journal]
  81. David A. Basin, Amy P. Felty
    Current Trends in Logical Frameworks and Metalanguages. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2001, v:27, n:1, pp:1-2 [Journal]
  82. David A. Basin, Stefan Friedrich, Marek Gawkowski
    Bytecode Verification by Model Checking. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2003, v:30, n:3-4, pp:399-444 [Journal]
  83. David A. Basin, Toby Walsh
    A Calculus for and Termination of Rippling. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1996, v:16, n:1-2, pp:147-180 [Journal]
  84. Ina Kraan, David A. Basin, Alan Bundy
    Middle-Out Reasoning for Synthesis and Induction. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1996, v:16, n:1-2, pp:113-145 [Journal]
  85. Alessandro Armando, David A. Basin, Jorge Cuéllar, Michaël Rusinowitch, Luca Viganò
    Automated Reasoning for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 2006, v:36, n:1-2, pp:1-3 [Journal]
  86. David A. Basin, Seán Matthews, Luca Viganò
    Labelled Modal Logics: Quantifiers. [Citation Graph (0, 0)][DBLP]
    Journal of Logic, Language and Information, 1998, v:7, n:3, pp:237-263 [Journal]
  87. Abdelwaheb Ayari, David A. Basin
    A Higher-order Interpretation of Deductive Tableau. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 2001, v:31, n:5, pp:487-520 [Journal]
  88. Penny Anderson, David A. Basin
    Program Development Schemata as Derived Rules. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 2000, v:30, n:1, pp:5-36 [Journal]
  89. David A. Basin, Olivier Danvy, Robert Harper
    Editorial. [Citation Graph (0, 0)][DBLP]
    Higher-Order and Symbolic Computation, 2004, v:17, n:3, pp:171-171 [Journal]
  90. David A. Basin, Seán Matthews
    Adding Metatheoretic Facilities to First-Order Theories. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 1996, v:6, n:6, pp:835-849 [Journal]
  91. David A. Basin, Seán Matthews, Luca Viganò
    Labelled Propositional Modal Logics: Theory and Practice. [Citation Graph (0, 0)][DBLP]
    J. Log. Comput., 1997, v:7, n:6, pp:685-717 [Journal]
  92. David A. Basin, Seán Matthews, Luca Viganò
    Natural Deduction for Non-Classical Logics. [Citation Graph (0, 0)][DBLP]
    Studia Logica, 1998, v:60, n:1, pp:119-160 [Journal]
  93. Abdelwaheb Ayari, David A. Basin, Felix Klaedtke
    Decision procedures for inductive Boolean functions based on alternating automata. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:300, n:1-3, pp:301-329 [Journal]
  94. Carlos Caleiro, Luca Viganò, David A. Basin
    On the semantics of Alice&Bob specifications of security protocols. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:88-122 [Journal]
  95. Ian Frank, David A. Basin
    A theoretical and empirical investigation of search in imperfect information games. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:252, n:1-2, pp:217-256 [Journal]
  96. David A. Basin, Manuel Clavel, José Meseguer
    Reflective metalogical frameworks. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Log., 2004, v:5, n:3, pp:528-576 [Journal]
  97. David A. Basin, Jürgen Doser, Torsten Lodderstedt
    Model driven security: From UML models to access control infrastructures. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2006, v:15, n:1, pp:39-91 [Journal]
  98. Patrick Schaller, Srdjan Capkun, David A. Basin
    BAP: Broadcast Authentication Using Cryptographic Puzzles. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:401-419 [Conf]
  99. Diana von Bidder, David A. Basin, Germano Caronni
    Midpoints Versus Endpoints: From Protocols to Firewalls. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:46-64 [Conf]
  100. Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter
    A Policy Language for Distributed Usage Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:531-546 [Conf]
  101. Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin
    Formalizing and Analyzing Sender Invariance. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:80-95 [Conf]
  102. David A. Basin, Manuel Clavel, Jürgen Doser, Marina Egea
    A Metamodel-Based Approach for Analyzing Security-Design Models. [Citation Graph (0, 0)][DBLP]
    MoDELS, 2007, pp:420-435 [Conf]
  103. Christoph Sprenger, David A. Basin
    A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols. [Citation Graph (0, 0)][DBLP]
    TPHOLs, 2007, pp:302-318 [Conf]
  104. Paul E. Sevinç, Mario Strasser, David A. Basin
    Securing the Distribution and Storage of Secrets with Trusted Platform Modules. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:53-66 [Conf]
  105. David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki, Kazuo Takaragi, Burkhart Wolff
    Verifying a signature architecture: a comparative case study. [Citation Graph (0, 0)][DBLP]
    Formal Asp. Comput., 2007, v:19, n:1, pp:63-91 [Journal]

  106. Policy Monitoring in First-Order Temporal Logic. [Citation Graph (, )][DBLP]


  107. An information-theoretic model for adaptive side-channel attacks. [Citation Graph (, )][DBLP]


  108. Mechanisms for usage control. [Citation Graph (, )][DBLP]


  109. A class of probabilistic models for role engineering. [Citation Graph (, )][DBLP]


  110. A probabilistic approach to hybrid role mining. [Citation Graph (, )][DBLP]


  111. Cryptographically-Sound Protocol-Model Abstractions. [Citation Graph (, )][DBLP]


  112. Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks. [Citation Graph (, )][DBLP]


  113. Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs. [Citation Graph (, )][DBLP]


  114. Impossibility Results for Secret Establishment. [Citation Graph (, )][DBLP]


  115. Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. [Citation Graph (, )][DBLP]


  116. Dynamic Enforcement of Abstract Separation of Duty Constraints. [Citation Graph (, )][DBLP]


  117. Modeling and Analyzing Security in the Presence of Compromising Adversaries. [Citation Graph (, )][DBLP]


  118. How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. [Citation Graph (, )][DBLP]


  119. Runtime Monitoring of Metric First-order Temporal Properties. [Citation Graph (, )][DBLP]


  120. Multi-assignment clustering for Boolean data. [Citation Graph (, )][DBLP]


  121. SSG: a model-based development environment for smart, security-aware GUIs. [Citation Graph (, )][DBLP]


  122. Developing Topology Discovery in Event-B. [Citation Graph (, )][DBLP]


  123. A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA). [Citation Graph (, )][DBLP]


  124. Monitoring security policies with metric first-order temporal logic. [Citation Graph (, )][DBLP]


  125. On the definition of role mining. [Citation Graph (, )][DBLP]


  126. A Labeled Tableaux Systemfor the Distributed Temporal Logic DTL. [Citation Graph (, )][DBLP]


  127. Let's Get Physical: Models and Methods for Real-World Security Protocols. [Citation Graph (, )][DBLP]


  128. Automatic Generation of Smart, Security-Aware GUI Models. [Citation Graph (, )][DBLP]


  129. Two approaches to an information security laboratory. [Citation Graph (, )][DBLP]


  130. SSL/TLS session-aware user authentication revisited. [Citation Graph (, )][DBLP]


  131. SSL/TLS Session-Aware User Authentication. [Citation Graph (, )][DBLP]


Search in 0.056secs, Finished in 0.061secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002