|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 105 occurrences of 68 keywords
|
|
|
Results
Found 144 publication records. Showing 144 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
234 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the BRSIM/UC soundness of Dolev-Yao-style XOR. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Dolev-Yao-style, Reactive simulatability/UC, Limitations, XOR, Computational soundness |
187 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Symmetric authentication in a simulatable Dolev-Yao-style cryptographic library. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Dolev-Yao, Symmetric authentication, Computational soundness |
187 | Michael Backes 0001, Thomas Groß 0001 |
Tailoring the Dolev-Yao abstraction to web services realities. |
SWS |
2005 |
DBLP DOI BibTeX RDF |
Dolev Yao, security proof of protocols, formal method, tool support, security analysis, web services security, federated identity management, protocol model |
164 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
141 | Michael Backes 0001, Matthias Schunter |
From absence of certain vulnerabilities towards security proofs: pushing the limits of formal verification. |
NSPW |
2003 |
DBLP DOI BibTeX RDF |
formal methods, cryptography |
140 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
118 | Michael Backes 0001, Dominique Unruh |
Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Formal methods, zero-knowledge proofs, computational soundness |
117 | Michael Backes 0001, Markus Dürmuth |
A Cryptographically Sound Dolev-Yao Style Security Proof of an Electronic Payment System. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
94 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying electronic voting protocols in typed MSR. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, typed MSR, privacy, specification, security protocols, electronic voting |
94 | Michael Backes 0001, Markus Dürmuth, Ralf Küsters |
On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography. |
FSTTCS |
2007 |
DBLP DOI BibTeX RDF |
|
94 | Ran Canetti, Jonathan Herzog |
Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
93 | Michael Backes 0001, Birgit Pfitzmann |
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
93 | Wenbo Mao |
A Structured Operational Modelling of the Dolev-Yao Threat Model. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
71 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani |
Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption. |
ACM Trans. Comput. Log. |
2008 |
DBLP DOI BibTeX RDF |
Diffie-Hellman exponentiation, Dolev-Yao model, complexity, protocols, Algebraic properties |
71 | Jean Goubault-Larrecq |
Towards Producing Formally Checkable Security Proofs, Automatically. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Dolev-Yao model, h1, security, model-checking, first-order logic, tree automata, proofs, Coq, Paradox |
71 | Jan Cederquist, Muhammad Torabi Dashti |
An intruder model for verifying liveness in security protocols. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
Dolev-Yao intruder, intruder models, security protocols, liveness properties |
71 | Michael Backes 0001, Birgit Pfitzmann |
Relating Symbolic and Cryptographic Secrecy. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Relations between models, probabilistic computation—cryptography, Dolev-Yao model, secrecy, simulatability |
71 | Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna |
Validating Security Protocols under the General Attacker. |
ARSPA-WITS |
2009 |
DBLP DOI BibTeX RDF |
|
71 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Low-Level Ideal Signatures and General Integrity Idealization. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
71 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Symmetric Authentication within a Simulatable Cryptographic Library. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
|
71 | Joseph Y. Halpern, Riccardo Pucella |
Modeling Adversaries in a Logic for Security Protocol Analysis. |
FASec |
2002 |
DBLP DOI BibTeX RDF |
|
70 | Riccardo Bresciani, Andrew Butterfield |
Weakening the Dolev-Yao model through probability. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
protocol verification |
70 | Detlef Kähler, Ralf Küsters, Thomas Wilke |
A Dolev-Yao-Based Definition of Abuse-Free Protocols. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
|
70 | Michael Backes 0001 |
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
70 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Justifying a Dolev-Yao Model Under Active Attacks. |
FOSAD |
2004 |
DBLP DOI BibTeX RDF |
|
70 | Yannick Chevalier, Ralf Küsters, Michaël Rusinowitch, Mathieu Turuani, Laurent Vigneron |
Extending the Dolev-Yao Intruder for Analyzing an Unbounded Number of Sessions. |
CSL |
2003 |
DBLP DOI BibTeX RDF |
|
70 | Roberto M. Amadio, Witold Charatonik |
On Name Generation and Set-Based Analysis in the Dolev-Yao Model. |
CONCUR |
2002 |
DBLP DOI BibTeX RDF |
name generation, verification, cryptographic protocols, set constraints |
47 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
Specifying and implementing privacy-preserving cryptographic protocols. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Specification of Security Protocols, Dolev-Yao Intruder, Security-typed language, Typed MSR, Jif, Privacy, Linkability |
47 | Roderick Chapman, Adrian Hilton 0002 |
Enforcing security and safety models with an information flow analysis tool. |
SIGAda |
2004 |
DBLP DOI BibTeX RDF |
Bell-LaPadula, Dolev-Yao, SPARK Ada, security, Ada, safety, information flow |
47 | Laurent Mazaré |
Decidability of Opacity with Non-Atomic Keys. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
Dolev-Yao Constraints, Security, Formal Verification, Decidability, Rewriting Systems, Opacity |
47 | Nazim Benaïssa |
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols. |
ABZ |
2008 |
DBLP DOI BibTeX RDF |
model for attacker, formal methods, cryptography |
47 | Peeter Laud, Long Ngo |
Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov |
Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Sadie Creese, Michael Goldsmith, Bill Roscoe, Ming Xiao |
Bootstrapping multi-party ad-hoc security. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
bootstrapping security, pervasive computing |
47 | Michael Backes 0001, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay |
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Stéphanie Delaune, Florent Jacquemard |
A Theory of Dictionary Attacks and its Complexity. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Roberto Zunino, Pierpaolo Degano |
A Note on the Perfect Encryption Assumption in a Process Calculus. |
FoSSaCS |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Angelo Troina, Alessandro Aldini, Roberto Gorrieri |
Towards a Formal Treatment of Secrecy Against Computational Adversaries. |
Global Computing |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Jan Cederquist, Muhammad Torabi Dashti |
Formal Analysis of a Fair Payment Protocol. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Iliano Cervesato |
Data Access Specification and the Most Powerful Symbolic Attacker in MSR. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov |
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. |
ISSS |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Joshua D. Guttman, F. Javier Thayer, Lenore D. Zuck |
The faithfulness of abstract protocol analysis: message authentication. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
|
47 | Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson |
Static Analysis for Secrecy and Non-interference in Networks of Processes. |
PaCT |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Itsaka Rakotonirina, Gilles Barthe, Clara Schneidewind |
Decision and Complexity of Dolev-Yao Hyperproperties. |
Proc. ACM Program. Lang. |
2024 |
DBLP DOI BibTeX RDF |
|
46 | Max Ammann, Lucca Hirschi, Steve Kremer |
DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
46 | Singam Bhargav Ram, Vanga Odelu |
Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover. |
CCWC |
2022 |
DBLP DOI BibTeX RDF |
|
46 | Andrew Cook, Luca Viganò 0001 |
A Game Of Drones: Extending the Dolev-Yao Attacker Model With Movement. |
EuroS&P Workshops |
2020 |
DBLP DOI BibTeX RDF |
|
46 | Anguraj Baskar, R. Ramanujam 0001, S. P. Suresh |
Dolev-Yao Theory with Associative Blindpair Operators. |
CIAA |
2019 |
DBLP DOI BibTeX RDF |
|
46 | Marco Rocchetto, Nils Ole Tippenhauer |
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
46 | Christoph Ponikwar, Hans-Joachim Hof, Smriti Gopinath, Lars Wischhof |
Beyond the Dolev-Yao Model: Realistic Application-Specific Attacker Models for Applications Using Vehicular Communication. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
46 | Marco Rocchetto, Nils Ole Tippenhauer |
CPDY: Extending the Dolev-Yao Attacker with Physical-Layer Interactions. |
ICFEM |
2016 |
DBLP DOI BibTeX RDF |
|
46 | Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov |
Bounded memory Dolev-Yao adversaries in collaborative systems. |
Inf. Comput. |
2014 |
DBLP DOI BibTeX RDF |
|
46 | Ramaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh |
Extending Dolev-Yao with Assertions. |
ICISS |
2014 |
DBLP DOI BibTeX RDF |
|
46 | Mauricio Ayala-Rincón, Yuri Santos Rego |
Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model. |
J. Formaliz. Reason. |
2013 |
DBLP DOI BibTeX RDF |
|
46 | Murat Moran, James Heather |
Automated Analysis of Voting Systems with Dolev-Yao Intruder Model. |
Electron. Commun. Eur. Assoc. Softw. Sci. Technol. |
2013 |
DBLP DOI BibTeX RDF |
|
46 | Bogdan Groza, Marius Minea |
Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels. |
CRITIS |
2013 |
DBLP DOI BibTeX RDF |
|
46 | István Vajda |
New look at impossibility result on Dolev-Yao models with hashes. |
IACR Cryptol. ePrint Arch. |
2011 |
DBLP BibTeX RDF |
|
46 | Jan Cederquist, Mohammad Torabi Dashti |
Complexity of fairness constraints for the Dolev-Yao attacker model. |
SAC |
2011 |
DBLP DOI BibTeX RDF |
|
46 | Qingliang Chen, Kaile Su, Chanjuan Liu, Yinyin Xiao |
Automatic Verification of Web Service Protocols for Epistemic Specifications under Dolev-Yao Model. |
ICSS |
2010 |
DBLP DOI BibTeX RDF |
|
46 | Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh |
A dexptime-Complete Dolev-Yao Theory with Distributive Encryption. |
MFCS |
2010 |
DBLP DOI BibTeX RDF |
|
46 | Zhiwei Li, Weichao Wang |
Deciding Recognizability under Dolev-Yao Intruder Model. |
ISC |
2010 |
DBLP DOI BibTeX RDF |
|
46 | Max I. Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov |
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems. |
Formal Aspects in Security and Trust |
2010 |
DBLP DOI BibTeX RDF |
|
46 | David A. Basin, Cas Cremers |
From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
46 | Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh |
A Dolev-Yao Model for Zero Knowledge. |
ASIAN |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Simon Kramer 0001 |
Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography. |
J. Log. Algebraic Methods Program. |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Michael Backes 0001, Birgit Pfitzmann, Andre Scedrov |
Key-dependent message security under active attacks - BRSIM/UC-soundness of Dolev-Yao-style encryption with key cycles. |
J. Comput. Secur. |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Mathieu Baudet |
Random Polynomial-Time Attacks and Dolev-Yao Models. |
J. Autom. Lang. Comb. |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Michael Backes 0001, Birgit Pfitzmann, Michael Waidner |
Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
46 | Jonathan Herzog |
A computational interpretation of Dolev-Yao adversaries. |
Theor. Comput. Sci. |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Roberto Zunino, Pierpaolo Degano |
Weakening the perfect encryption assumption in Dolev-Yao adversaries. |
Theor. Comput. Sci. |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Wenbo Mao |
A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols. |
Comput. Stand. Interfaces |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Michael Backes 0001, Birgit Pfitzmann |
Limits of the Cryptographic Realization of Dolev-Yao-style XOR. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
46 | Laurent Mazaré |
Satisfiability of Dolev-Yao Constraints. |
ARSPA@IJCAR |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Michael Backes 0001, Birgit Pfitzmann |
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
46 | Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas |
An Extension of Typed MSR for Specifying Esoteric Protocols and Their Dolev-Yao Intruder. |
Communications and Multimedia Security |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Chiara Bodei, Pierpaolo Degano, Flemming Nielson, Hanne Riis Nielson |
Flow logic for Dolev-Yao secrecy in cryptographic processes. |
Future Gener. Comput. Syst. |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Qi Mi, John A. Stankovic, Radu Stoleru |
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, key distribution, secure localization |
24 | David A. Basin, Srdjan Capkun, Patrick Schaller, Benedikt Schmidt 0002 |
Let's Get Physical: Models and Methods for Real-World Security Protocols. |
TPHOLs |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Bogdan Groza, Marius Minea |
A Calculus to Detect Guessing Attacks. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Laurent Mazaré, Bogdan Warinschi |
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption. |
ARSPA-WITS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Bruno Blanchet |
A Computationally Sound Mechanized Prover for Security Protocols. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Ralf Küsters, Tomasz Truderung |
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
security protocols, algebraic properties |
24 | Myrto Arapinis, Stéphanie Delaune, Steve Kremer |
From One Session to Many: Dynamic Tags for Security Protocols. |
LPAR |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Christoph Sprenger 0001, David A. Basin |
Cryptographically-Sound Protocol-Model Abstractions. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
cryptographic soundness, formal methods, theorem proving, Cryptographic protocols, simulatability |
24 | Riccardo Focardi, Matteo Centenaro |
Information flow security of multi-threaded distributed programs. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
symbolic cryptography, information flow, bisimulation, language-based security |
24 | Ton van Deursen, Sjouke Mauw, Sasa Radomirovic |
Untraceability of RFID Protocols. |
WISTP |
2008 |
DBLP DOI BibTeX RDF |
RFID protocols, formal verification, untraceability |
24 | David Galindo, Flavio D. Garcia, Peter van Rossum |
Computational Soundness of Non-Malleable Commitments. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wei Wang 0062, Dongyao Ji |
Using SPIN to Detect Vulnerabilities in the AACS Drive-Host Authentication Protocol. |
FORTE |
2008 |
DBLP DOI BibTeX RDF |
AACS, Authenticity, SPIN, LTL, Collusion Attack, Model Checker |
24 | Iliano Cervesato, Catherine Meadows 0001 |
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
C.2.0.f Network-level security and protection, C.2.2.c Protocol verification, F.4.3 Formal Languages |
24 | Virgil D. Gligor |
On the evolution of adversary models in security protocols: from the beginning to sensor networks. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Yannick Chevalier, Denis Lugiez, Michaël Rusinowitch |
Verifying Cryptographic Protocols with Subterms Constraints. |
LPAR |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Alessandro Armando, Roberto Carbone, Luca Compagna |
LTL Model Checking for Security Protocols. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Véronique Cortier, Stéphanie Delaune, Graham Steel |
A Formal Theory of Key Conjuring. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Detlef Kähler, Ralf Küsters, Tomasz Truderung |
Infinite State AMC-Model Checking for Cryptographic Protocols. |
LICS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn |
Verifying Smart Card Applications: An ASM Approach. |
IFM |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Guoqiang Shu, David Lee 0001 |
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach. |
ICDCS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Jeffrey A. Vaughan, Steve Zdancewic |
A Cryptographic Decentralized Label Model. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Stéphanie Delaune, Florent Jacquemard |
Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. |
J. Autom. Reason. |
2006 |
DBLP DOI BibTeX RDF |
verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption |
24 | Guoqiang Shu, David Lee 0001 |
Message Confidentiality Testing of Security Protocols - Passive Monitoring and Active Checking. |
TestCom |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Christoph Sprenger 0001, Michael Backes 0001, David A. Basin, Birgit Pfitzmann, Michael Waidner |
Cryptographically Sound Theorem Proving. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 144 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|