Search the dblp DataBase
Cas J. F. Cremers :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Cas J. F. Cremers Feasibility of Multi-Protocol Attacks. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:287-294 [Conf ] Cas J. F. Cremers , Sjouke Mauw Operational Semantics of Security Protocols. [Citation Graph (0, 0)][DBLP ] Scenarios: Models, Transformations and Tools, 2003, pp:66-89 [Conf ] Cas J. F. Cremers , Sjouke Mauw Checking Secrecy by Means of Partial Order Reduction. [Citation Graph (0, 0)][DBLP ] SAM, 2004, pp:171-188 [Conf ] Cas J. F. Cremers Compositionality of Security Protocols: A Research Agenda. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:142, n:, pp:99-110 [Journal ] Cas J. F. Cremers , Sjouke Mauw , Erik P. de Vink A Syntactic Criterion for Injectivity of Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:135, n:1, pp:23-38 [Journal ] Sjouke Mauw , Valérie Issarny , Cas J. F. Cremers Preface. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:1-2 [Journal ] Cas J. F. Cremers , Sjouke Mauw , Erik P. de Vink Injective synchronisation: An extension of the authentication hierarchy. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:139-161 [Journal ] Suzana Andova , Cas J. F. Cremers , Kristian Gjøsteen , Sjouke Mauw , Stig Fr. Mjølsnes , Sasa Radomirovic A framework for compositional verification of security protocols [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Cas J. F. Cremers On the Protocol Composition Logic PCL [Citation Graph (0, 0)][DBLP ] CoRR, 2007, v:0, n:, pp:- [Journal ] Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol. [Citation Graph (, )][DBLP ] The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. [Citation Graph (, )][DBLP ] On the protocol composition logic PCL. [Citation Graph (, )][DBLP ] Unbounded verification, falsification, and characterization of security protocols by pattern refinement. [Citation Graph (, )][DBLP ] Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs. [Citation Graph (, )][DBLP ] Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries. [Citation Graph (, )][DBLP ] Complete Characterization of Security Protocols by Pattern Refinement. [Citation Graph (, )][DBLP ] Modeling and Analyzing Security in the Presence of Compromising Adversaries. [Citation Graph (, )][DBLP ] Comparing State Spaces in Automatic Security Protocol Analysis. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs