The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Scyther with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2008-2022 (10)
Publication types (Num. hits)
article(3) inproceedings(7)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3 occurrences of 3 keywords

Results
Found 10 publication records. Showing 10 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Benoît Bertholon, Sébastien Varrette, Pascal Bouvry Certicloud: A Novel TPM-based Approach to Ensure Cloud IaaS Security. Search on Bibsonomy IEEE CLOUD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Scyther, Avispa, Cloud Computing, TPM, IaaS
34Tomás Rabas, Róbert Lórencz, Jirí Bucek Verification of PUF-based IoT Protocols with AVISPA and Scyther. Search on Bibsonomy SECRYPT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
34Zeyad Mohammad Cryptanalysis and improvement of the YAK protocol with formal security proof and security verification via Scyther. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
34Ruhul Amin 0001, Paras Lohani, McLican Ekka, Sunay Chourasia, Satyanarayana Vollala An enhanced anonymity resilience security protocol for vehicular ad-hoc network with Scyther simulation. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
34R. Pradeep, N. R. Sunitha, V. Ravi, Sushma Verma Formal Verification of Authentication and Confidentiality for TACACS+ Security Protocol using Scyther. Search on Bibsonomy ICCCNT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
34Houssem Eddine Mohamadi, Nadjia Kara, Mohand Lagha Formal Verification of RGR-SEC, a Secured RGR Routing for UAANETs Using AVISPA, Scyther and Tamarin. Search on Bibsonomy FNSS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
34Huihui Yang, Vladimir A. Oleshchuk, Andreas Prinz 0001 Verifying Group Authentication Protocols by Scyther. Search on Bibsonomy J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
34Huihui Yang, Andreas Prinz 0001, Vladimir A. Oleshchuk Formal Analysis and Model Checking of a Group Authentication Protocol by Scyther. Search on Bibsonomy PDP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
34Ubaid Ur Rehman, Abdul Ghafoor Abbasi Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by Scyther. Search on Bibsonomy ITNG The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
34Cas J. F. Cremers The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #10 of 10 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license