The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

F. Javier Thayer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    IMPS: An Updated System Description. [Citation Graph (0, 0)][DBLP]
    CADE, 1996, pp:298-302 [Conf]
  2. William M. Farmer, Joshua D. Guttman, Mark E. Nadel, F. Javier Thayer
    Proof Script Pragmatics in IMPS. [Citation Graph (0, 0)][DBLP]
    CADE, 1994, pp:356-370 [Conf]
  3. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    IMPS: An Interactive Mathematical Proof System. [Citation Graph (0, 0)][DBLP]
    CADE, 1990, pp:653-654 [Conf]
  4. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    Little Theories. [Citation Graph (0, 0)][DBLP]
    CADE, 1992, pp:567-581 [Conf]
  5. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    IMPS: System Description. [Citation Graph (0, 0)][DBLP]
    CADE, 1992, pp:701-705 [Conf]
  6. Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck
    The faithfulness of abstract protocol analysis: message authentication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:186-195 [Conf]
  7. Joshua D. Guttman, F. Javier Thayer
    Protocol Independence through Disjoint Encryption. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:24-34 [Conf]
  8. Dale M. Johnson, F. Javier Thayer
    Security and the Composition of Machines. [Citation Graph (0, 0)][DBLP]
    CSFW, 1988, pp:72-89 [Conf]
  9. Dale M. Johnson, F. Javier Thayer
    Security Properties Consistent with the Testing Semantics for Communicating Processes. [Citation Graph (0, 0)][DBLP]
    CSFW, 1989, pp:9-21 [Conf]
  10. F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
    Honest Ideals on Strand Spaces. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:66-77 [Conf]
  11. F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
    Mixed Strand Spaces. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:72-82 [Conf]
  12. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    Reasoning with Contexts. [Citation Graph (0, 0)][DBLP]
    DISCO, 1993, pp:216-228 [Conf]
  13. Vipin Swarup, F. Javier Thayer
    Trust: Benefits, Models, and Mechanisms. [Citation Graph (0, 0)][DBLP]
    Secure Internet Programming, 1999, pp:3-18 [Conf]
  14. Joshua D. Guttman, F. Javier Thayer, Jay A. Carlson, Jonathan C. Herzog, John D. Ramsdell, Brian T. Sniffen
    Trust Management in Strand Spaces: A Rely-Guarantee Method. [Citation Graph (0, 0)][DBLP]
    ESOP, 2004, pp:325-339 [Conf]
  15. Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
    Authentication and Confidentiality via IPSEC. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:255-272 [Conf]
  16. Joshua D. Guttman, F. Javier Thayer
    Authentication Tests. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:96-109 [Conf]
  17. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
    Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:173, n:, pp:85-102 [Journal]
  18. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    IMPS: An Interactive Mathematical Proof System. [Citation Graph (0, 0)][DBLP]
    J. Autom. Reasoning, 1993, v:11, n:2, pp:213-248 [Journal]
  19. Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck
    The faithfulness of abstract protocol analysis: Message authentication. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:6, pp:865-891 [Journal]
  20. F. Javier Thayer, Jonathan C. Herzog, Joshua D. Guttman
    Strand Spaces: Proving Security Protocols Correct. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]
  21. William M. Farmer, Joshua D. Guttman, F. Javier Thayer
    Context in Mathematical Reasoning and Computation. [Citation Graph (0, 0)][DBLP]
    J. Symb. Comput., 1995, v:19, n:1-3, pp:210-206 [Journal]
  22. Joshua D. Guttman, F. Javier Thayer
    Authentication tests and the structure of bundles. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2002, v:283, n:2, pp:333-380 [Journal]
  23. Dale M. Johnson, F. Javier Thayer
    Stating Security Requirements with Tolerable Sets. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 1988, v:6, n:3, pp:284-295 [Journal]
  24. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
    Completeness of the Authentication Tests. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:106-121 [Conf]
  25. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
    Searching for Shapes in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    TACAS, 2007, pp:523-537 [Conf]

  26. Strand Spaces: Why is a Security Protocol Correct? [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002