|
Search the dblp DataBase
Graham Steel:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Graham Steel
Deduction with XOR Constraints in Security API Modelling. [Citation Graph (0, 0)][DBLP] CADE, 2005, pp:322-336 [Conf]
- Graham Steel, Alan Bundy, Monika Maidl
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures. [Citation Graph (0, 0)][DBLP] IJCAR, 2004, pp:137-151 [Conf]
- Graham Steel, Alan Bundy
Attacking Group Multicast Key Management Protocols Using Coral. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:125-144 [Journal]
- Graham Steel, Alan Bundy
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures. [Citation Graph (0, 0)][DBLP] J. Autom. Reasoning, 2006, v:36, n:1-2, pp:149-176 [Journal]
- Graham Steel
Formal analysis of PIN block attacks. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:257-270 [Journal]
- Véronique Cortier, Gavin Keighren, Graham Steel
Automatic Analysis of the Security of XOR-Based Key Management Schemes. [Citation Graph (0, 0)][DBLP] TACAS, 2007, pp:538-552 [Conf]
A Formal Theory of Key Conjuring. [Citation Graph (, )][DBLP]
Formal Analysis of PKCS#11. [Citation Graph (, )][DBLP]
Type-Based Analysis of PIN Processing APIs. [Citation Graph (, )][DBLP]
A Generic Security API for Symmetric Key Management on Cryptographic Devices. [Citation Graph (, )][DBLP]
Formal Analysis of Privacy for Vehicular Mix-Zones. [Citation Graph (, )][DBLP]
Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data. [Citation Graph (, )][DBLP]
Towards a Type System for Security APIs. [Citation Graph (, )][DBLP]
The Importance of Non-theorems and Counterexamples in Program Verification. [Citation Graph (, )][DBLP]
Blunting Differential Attacks on PIN Processing APIs. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|