The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sebastian Mödersheim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron
    The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. [Citation Graph (0, 0)][DBLP]
    CAV, 2005, pp:281-285 [Conf]
  2. Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron
    The AVISS Security Protocol Analysis Tool. [Citation Graph (0, 0)][DBLP]
    CAV, 2002, pp:349-353 [Conf]
  3. David A. Basin, Sebastian Mödersheim, Luca Viganò
    CDiff: a new reduction technique for constraint-based analysis of security protocols. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:335-344 [Conf]
  4. David A. Basin, Sebastian Mödersheim, Luca Viganò
    An On-the-Fly Model-Checker for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:253-270 [Conf]
  5. David A. Basin, Stefan Friedrich, Sebastian Mödersheim
    B2M: A Semantic Based Tool for BLIF Hardware Descriptions. [Citation Graph (0, 0)][DBLP]
    FMCAD, 2000, pp:91-107 [Conf]
  6. Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò
    Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. [Citation Graph (0, 0)][DBLP]
    FoSSaCS, 2006, pp:428-445 [Conf]
  7. David A. Basin, Sebastian Mödersheim, Luca Viganò
    Algebraic Intruder Deductions. [Citation Graph (0, 0)][DBLP]
    LPAR, 2005, pp:549-564 [Conf]
  8. Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò
    A Formalization of Off-Line Guessing for Security Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    LPAR, 2004, pp:363-379 [Conf]
  9. Paul Hankes Drielsma, Sebastian Mödersheim
    The ASW Protocol Revisited: A Unified View. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:145-161 [Journal]
  10. David A. Basin, Sebastian Mödersheim, Luca Viganò
    OFMC: A symbolic model checker for security protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:3, pp:181-208 [Journal]
  11. Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin
    Formalizing and Analyzing Sender Invariance. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:80-95 [Conf]

  12. Algebraic Properties in Alice and Bob Notation. [Citation Graph (, )][DBLP]


  13. Secure Pseudonymous Channels. [Citation Graph (, )][DBLP]


  14. The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. [Citation Graph (, )][DBLP]


  15. Integrating Automated and Interactive Protocol Verification. [Citation Graph (, )][DBLP]


  16. A card requirements language enabling privacy-preserving access control. [Citation Graph (, )][DBLP]


  17. A Formal Model of Identity Mixer. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002