Number of items: 5.
Basin, David and Cremers, Cas and Dreier, Jannik and Sasse, Ralf
(2017)
Symbolically Analyzing Security Protocols Using Tamarin.
SIGLOG News, 4 (4).
pp. 19-30.
Boyd, Colin and Cremers, Cas and Feltz, Michèle and Paterson, Kenneth G. and Poettering, Bertram and Stebila, Douglas
(2017)
ASICS: Authenticated Key Exchange Security Incorporating
Certification Systems.
International Journal of Information Security, 16 (2).
pp. 151-171.
Cohn-Gordon, Katriel and Cremers, Cas and Dowling, Benjamin and Stebila, Douglas
(2017)
A Formal Security Analysis of the Signal Messaging Protocol.
Cremers, Cas and Dehnel-Wild, Martin and Milner, Kevin
(2017)
Secure Authentication in the Grid:
A Formal Analysis of DNP3: SAv5.
Milner, Kevin and Cremers, Cas and Jiangshan, Yu and Ryan, Mark
(2017)
Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.
This list was generated on Sun Nov 24 10:37:02 2024 CET.