researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2011
2012
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Catalin Hritcu
Erik Poll
Florent Jacquemard
Francine Krief
Graham Steel
Henri-Charles Blondeel
Joeri de Ruiter
Joshua D. Guttman
Jules Villard
Kim Pecina
Manuel Serrano
Marieke Huisman
Matteo Maffei
Michael Backes
Moez Ben MBarka
Morten Dahl
Olivier Ly
Ralf Treinen
Raphael M. Reischuk
Sreekanth Malladi
Filter by Top terms
[+]
OR
AND
NOT
1
1
2011
31
analysis
anonymous
applications
applied
april
automated
calculus
cancellation
checking
code
composition
congruence
formal
protocol
protocols
secure
security
TOSCA (tosca)
Editions
Publications
Viewing Publication 1 - 13 from 13
2012
Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers
Sebastian Mödersheim
,
Catuscia Palamidessi
, editors,
Volume 6993 of
Lecture Notes in Computer Science
, Springer,
2012.
[doi]
2011
G2C: Cryptographic Protocols from Goal-Driven Specifications
Michael Backes
,
Matteo Maffei
,
Kim Pecina
,
Raphael M. Reischuk
.
tosca 2012
:
57-77
[doi]
Union and Intersection Types for Secure Protocol Implementations
Michael Backes
,
Catalin Hritcu
,
Matteo Maffei
.
tosca 2012
:
1-28
[doi]
Secure Composition of Protocols
Véronique Cortier
.
tosca 2012
:
29-32
[doi]
Formal Analysis of Privacy for Anonymous Location Based Services
Morten Dahl
,
Stéphanie Delaune
,
Graham Steel
.
tosca 2012
:
98-112
[doi]
Formal Analysis of the EMV Protocol Suite
Joeri de Ruiter
,
Erik Poll
.
tosca 2012
:
113-129
[doi]
Security Goals and Protocol Transformations
Joshua D. Guttman
.
tosca 2012
:
130-147
[doi]
Model-Checking Secure Information Flow for Multi-threaded Programs
Marieke Huisman
,
Henri-Charles Blondeel
.
tosca 2012
:
148-165
[doi]
Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus
Florent Jacquemard
,
Étienne Lozes
,
Ralf Treinen
,
Jules Villard
.
tosca 2012
:
166-185
[doi]
Automated Code Injection Prevention for Web Applications
Zhengqin Luo
,
Tamara Rezk
,
Manuel Serrano
.
tosca 2012
:
186-204
[doi]
Soundness of Removing Cancellation Identities in Protocol Analysis under Exclusive-OR
Sreekanth Malladi
.
tosca 2012
:
205-224
[doi]
Constructive Cryptography - A New Paradigm for Security Definitions and Proofs
Ueli Maurer
.
tosca 2012
:
33-56
[doi]
Modeling Long-Term Signature Validation for Resolution of Dispute
Moez Ben MBarka
,
Francine Krief
,
Olivier Ly
.
tosca 2012
:
78-97
[doi]
Sign in
or
sign up
to see more results.