|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3 occurrences of 3 keywords
|
|
|
Results
Found 10 publication records. Showing 10 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Benoît Bertholon, Sébastien Varrette, Pascal Bouvry |
Certicloud: A Novel TPM-based Approach to Ensure Cloud IaaS Security. |
IEEE CLOUD |
2011 |
DBLP DOI BibTeX RDF |
Scyther, Avispa, Cloud Computing, TPM, IaaS |
34 | Tomás Rabas, Róbert Lórencz, Jirí Bucek |
Verification of PUF-based IoT Protocols with AVISPA and Scyther. |
SECRYPT |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Zeyad Mohammad |
Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther. |
Int. J. Commun. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
34 | Ruhul Amin 0001, Paras Lohani, McLican Ekka, Sunay Chourasia, Satyanarayana Vollala |
An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. |
Comput. Electr. Eng. |
2020 |
DBLP DOI BibTeX RDF |
|
34 | R. Pradeep, N. R. Sunitha, V. Ravi, Sushma Verma |
Formal Verification of Authentication and Confidentiality for TACACS+ Security Protocol using Scyther. |
ICCCNT |
2019 |
DBLP DOI BibTeX RDF |
|
34 | Houssem Eddine Mohamadi, Nadjia Kara, Mohand Lagha |
Formal Verification of RGR-SEC, a Secured RGR Routing for UAANETs Using AVISPA, Scyther and Tamarin. |
FNSS |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Huihui Yang, Vladimir A. Oleshchuk, Andreas Prinz 0001 |
Verifying Group Authentication Protocols by Scyther. |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Huihui Yang, Andreas Prinz 0001, Vladimir A. Oleshchuk |
Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther. |
PDP |
2016 |
DBLP DOI BibTeX RDF |
|
34 | Ubaid Ur Rehman, Abdul Ghafoor Abbasi |
Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther. |
ITNG |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Cas J. F. Cremers |
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. |
CAV |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #10 of 10 (100 per page; Change: )
|
|