|
Search the dblp DataBase
F. Javier Thayer:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- William M. Farmer, Joshua D. Guttman, F. Javier Thayer
IMPS: An Updated System Description. [Citation Graph (0, 0)][DBLP] CADE, 1996, pp:298-302 [Conf]
- William M. Farmer, Joshua D. Guttman, Mark E. Nadel, F. Javier Thayer
Proof Script Pragmatics in IMPS. [Citation Graph (0, 0)][DBLP] CADE, 1994, pp:356-370 [Conf]
- William M. Farmer, Joshua D. Guttman, F. Javier Thayer
IMPS: An Interactive Mathematical Proof System. [Citation Graph (0, 0)][DBLP] CADE, 1990, pp:653-654 [Conf]
- William M. Farmer, Joshua D. Guttman, F. Javier Thayer
Little Theories. [Citation Graph (0, 0)][DBLP] CADE, 1992, pp:567-581 [Conf]
- William M. Farmer, Joshua D. Guttman, F. Javier Thayer
IMPS: System Description. [Citation Graph (0, 0)][DBLP] CADE, 1992, pp:701-705 [Conf]
- Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck
The faithfulness of abstract protocol analysis: message authentication. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2001, pp:186-195 [Conf]
- Joshua D. Guttman, F. Javier Thayer
Protocol Independence through Disjoint Encryption. [Citation Graph (0, 0)][DBLP] CSFW, 2000, pp:24-34 [Conf]
- Dale M. Johnson, F. Javier Thayer
Security and the Composition of Machines. [Citation Graph (0, 0)][DBLP] CSFW, 1988, pp:72-89 [Conf]
- Dale M. Johnson, F. Javier Thayer
Security Properties Consistent with the Testing Semantics for Communicating Processes. [Citation Graph (0, 0)][DBLP] CSFW, 1989, pp:9-21 [Conf]
- F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
Honest Ideals on Strand Spaces. [Citation Graph (0, 0)][DBLP] CSFW, 1998, pp:66-77 [Conf]
- F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
Mixed Strand Spaces. [Citation Graph (0, 0)][DBLP] CSFW, 1999, pp:72-82 [Conf]
- William M. Farmer, Joshua D. Guttman, F. Javier Thayer
Reasoning with Contexts. [Citation Graph (0, 0)][DBLP] DISCO, 1993, pp:216-228 [Conf]
- Vipin Swarup, F. Javier Thayer
Trust: Benefits, Models, and Mechanisms. [Citation Graph (0, 0)][DBLP] Secure Internet Programming, 1999, pp:3-18 [Conf]
- Joshua D. Guttman, F. Javier Thayer, Jay A. Carlson, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen
Trust Management in Strand Spaces: A Rely-Guarantee Method. [Citation Graph (0, 0)][DBLP] ESOP, 2004, pp:325-339 [Conf]
- Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
Authentication and Confidentiality via IPSEC. [Citation Graph (0, 0)][DBLP] ESORICS, 2000, pp:255-272 [Conf]
- Joshua D. Guttman, F. Javier Thayer
Authentication Tests. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2000, pp:96-109 [Conf]
- Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:173, n:, pp:85-102 [Journal]
- William M. Farmer, Joshua D. Guttman, F. Javier Thayer
IMPS: An Interactive Mathematical Proof System. [Citation Graph (0, 0)][DBLP] J. Autom. Reasoning, 1993, v:11, n:2, pp:213-248 [Journal]
- Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck
The faithfulness of abstract protocol analysis: Message authentication. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:6, pp:865-891 [Journal]
- F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
Strand Spaces: Proving Security Protocols Correct. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]
- William M. Farmer, Joshua D. Guttman, F. Javier Thayer
Context in Mathematical Reasoning and Computation. [Citation Graph (0, 0)][DBLP] J. Symb. Comput., 1995, v:19, n:1-3, pp:210-206 [Journal]
- Joshua D. Guttman, F. Javier Thayer
Authentication tests and the structure of bundles. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2002, v:283, n:2, pp:333-380 [Journal]
- Dale M. Johnson, F. Javier Thayer
Stating Security Requirements with Tolerable Sets. [Citation Graph (0, 0)][DBLP] ACM Trans. Comput. Syst., 1988, v:6, n:3, pp:284-295 [Journal]
- Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
Completeness of the Authentication Tests. [Citation Graph (0, 0)][DBLP] ESORICS, 2007, pp:106-121 [Conf]
- Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
Searching for Shapes in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] TACAS, 2007, pp:523-537 [Conf]
Strand Spaces: Why is a Security Protocol Correct? [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.301secs
|