1999 |
10 | EE | Stephen H. Brackin:
Using Checkable Types in Automatic Protocol Analysis.
ACSAC 1999: 99-108 |
9 | EE | Stephen H. Brackin:
Implementing Effective Automatic Cryptographic Protocol Analysis.
ASE 1999: 319-322 |
1998 |
8 | EE | Stephen H. Brackin:
Evaluating and Improving Protocol Analysis by Automatic Proof.
CSFW 1998: 138-152 |
1997 |
7 | EE | Stephen H. Brackin:
An Interface Specification Language for Automatically Analyzing Cryptographic Protocols.
NDSS 1997 |
1996 |
6 | EE | Randall W. Lichota,
Grace L. Hammonds,
Stephen H. Brackin:
Verifying The Correctness Of Cryptographic Protocols Using "Convince".
ACSAC 1996: 117-128 |
5 | EE | Stephen H. Brackin:
A HOL extension of GNY for automatically analyzing cryptographic protocols.
CSFW 1996: 62- |
4 | | Stephen H. Brackin:
Deciding Cryptographic Protocol Adequacy with HOL: The Implementation.
TPHOLs 1996: 61-76 |
1995 |
3 | | Stephen H. Brackin:
Deciding Cryptographic Protocol Adequacy with HOL.
TPHOLs 1995: 90-105 |
1994 |
2 | | Stephen H. Brackin:
Providing Tractable Security Analysis in HOL.
TPHOLs 1994: 65-80 |
1993 |
1 | | Stephen H. Brackin,
Shiu-Kai Chin:
Server-Process Restrictiveness in HOL.
HUG 1993: 450-463 |