Papers
Communities
Events
Blog
Pricing
Search
Open menu
Home
Papers
0802.3444
Cited By
Automatic Verification of Correspondences for Security Protocols
23 February 2008
B. Blanchet
Re-assign community
ArXiv
PDF
HTML
Papers citing
"Automatic Verification of Correspondences for Security Protocols"
20 / 20 papers shown
Title
Provably Unlinkable Smart Card-based Payments
Sergiu Bursuc
Ross Horne
S. Mauw
S. Yurkov
17
1
0
06 Sep 2023
The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm
B. Blanchet
11
7
0
22 Nov 2022
A
2
R
I
D
A^2RID
A
2
R
I
D
-- Anonymous Direct Authentication and Remote Identification of Commercial Drones
E. Wisse
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
9
13
0
21 Oct 2022
Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
31
94
0
21 Dec 2021
Bulwark: Holistic and Verified Security Monitoring of Web Protocols
Lorenzo Veronese
Stefano Calzavara
Luca Demetrio
17
4
0
15 Jan 2021
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol
Pietro Tedeschi
S. Bakiras
Roberto Di Pietro
11
5
0
14 Nov 2020
Verifying Cryptographic Security Implementations in C Using Automated Model Extraction
Mihhail Aizatulin
11
2
0
03 Jan 2020
Formal Analysis of an E-Health Protocol
Naipeng Dong
H. Jonker
Jun Pang
13
2
0
25 Aug 2018
QRES: Quantitative Reasoning on Encrypted Security SLAs
Ahmed Taha
Spyros Boukoros
Jesus Luna
Stefan Katzenbeisser
N. Suri
17
0
0
12 Apr 2018
Analysing and Patching SPEKE in ISO/IEC
Feng Hao
Roberto Metere
S. F. Shahandashti
Changyu Dong
19
11
0
14 Feb 2018
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks
Hengchuan Tan
M. Ma
H. Labiod
Aymen Boudguiga
Jun Zhang
P. Chong
19
48
0
28 Dec 2017
Survey on Data-Centric based Routing Protocols for Wireless Sensor Networks
K. A. Rasbi
Hothefa Shaker
Zeyad T. Sharef
14
6
0
11 May 2017
Automated verification of dynamic root of trust protocols (long version)
Sergiu Bursuc
Christian Johansen
Shiwei Xu
24
4
0
30 Jan 2017
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication
M. Abadi
B. Blanchet
Cédric Fournet
28
95
0
10 Sep 2016
Discovering, quantifying, and displaying attacks
R. Vigo
F. Nielson
H. R. Nielson
23
4
0
26 Jul 2016
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols
Jaouhar Fattahi
M. Mejri
H. Houmani
35
4
0
12 Aug 2014
Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems
Ludovic Apvrille
Y. Roudier
45
22
0
08 Apr 2014
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Mihhail Aizatulin
Andrew D. Gordon
Jan Jurjens
43
66
0
06 Jul 2011
Satisfiability of General Intruder Constraints with and without a Set Constructor
Tigran Avanesov
Yannick Chevalier
M. Rusinowitch
Mathieu Turuani
63
6
0
01 Mar 2011
Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach
Ralf Küsters
Tomasz Truderung
98
77
0
05 Aug 2008
1