Items where Author is "Basin, David"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 13.

Conference or Workshop Item (A Paper)

Girol, Guillaume and Hirschi, Lucca and Sasse, Ralf and Jackson, Dennis and Cremers, Cas and Basin, David
(2020) A Spectral Analysis of Noise:A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols.
In: 29th USENIX Security Symposium (USENIX Security 20), August 12–14, 2020.
Conference: USENIX-Security Usenix Security Symposium

Basin, David and Jugé, Vincent and Klaedtke, Felix and Zvalinescu, Eugen
(2012) Enforceable Security Policies Revisited.
In: Proc. 1st Conference on Principles of Security and Trust (POST).

Basin, David and Klaedtke, Felix and Marinovic, Srdjan and Zălinescu, Eugen
(2012) Monitoring compliance policies over incomplete and disagreeing logs.
In: Proceedings of the 3rd International Conference on Runtime Verification (RV'2012).

Basin, David and Cremers, Cas and Meier, Simon
(2012) Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication.
In: Proc. 1st Conference on Principles of Security and Trust (POST).

Tsankov, Petar and Basin, David and Dashti, Mohammad Torabi
(2011) Constructing Mid-Points for Two-Party Asynchronous Protocols.
In: Proc. 15th International Conference On Principles Of Distributed Systems (OPODIS).

Basin, David and Burri, Samuel J and Karjoth, Günter
(2011) Obstruction-free Authorization Enforcement: Aligning Security With Business Objectives.
In: Proceedings of the 24th IEEE Computer Security Foundations Symposium.
Conference: CSF IEEE Computer Security Foundations Symposium (was CSFW)

Sprenger, Christoph and Backes, Michael and Basin, David and Pfitzmann, Birgit and Waidner, Michael
(2006) Cryptographically Sound Theorem Proving.
In: Proceedings of 19th IEEE Computer Security Foundations Workshop (CSFW).

Article

Basin, David and Cremers, Cas and Dreier, Jannik and Sasse, Ralf
(2022) Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols.
IEEE Security and Privacy. ISSN 1540-7993

Troncoso, Carmela and Payer, Matthias and Hubaux, Jean-Pierre and Salathé, Marcel and Larus, James and Lueks, Wouter and Stadler, Theresa and Pyrgelis, Apostolos and Antonioli, Daniele and Barman, Ludovic and Chatel, Sylvain and Paterson, Kenneth G. and Capkun, Srdjan and Basin, David and Beutel, Jan and Jackson, Dennis and Roeschlin, Marc and Leu, Patrick and Preneel, Bart and Smart, Nigel and Abidin, Aysajan and Gürses, Seda and Veale, Michael and Cremers, Cas and Backes, Michael and Tippenhauer, Nils Ole and Binns, Reuben and Cattuto, Ciro and Barrat, Alain and Fiore, Dario and Barbosa, Manuel and Oliveira, Rui and Pereira, José
(2020) Decentralized Privacy-Preserving Proximity Tracing.
IEEE Data Engineering Bulletin Volume 43, Number 2, June 2020. pp. 36-66.

Basin, David and Cremers, Cas and Kim, Tiffany Hyun-Jin and Perrig, Adrian and Sasse, Ralf and Szalachowski, Pavel
(2018) Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Transactions on Dependable and Secure Computing, 15 (3). pp. 393-408.

Basin, David and Cremers, Cas and Dreier, Jannik and Sasse, Ralf
(2017) Symbolically Analyzing Security Protocols Using Tamarin.
SIGLOG News, 4 (4). pp. 19-30.

Book Section

Basin, David and Cremers, Cas and Meadows, Catherine A.
(2018) Model Checking Security Protocols.
In: Handbook of Model Checking. Springer International Publishing, pp. 727-762. ISBN 978-3-319-10574-1

Book

Backes, Michael and Basin, David and Waidner, Michael
(2003) Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C.
ACM.

This list was generated on Tue Dec 3 18:19:49 2024 CET.