2007 |
11 | EE | Jan Cederquist,
Muhammad Torabi Dashti,
Sjouke Mauw:
A Certified Email Protocol Using Key Chains.
AINA Workshops (1) 2007: 525-530 |
10 | EE | M. A. C. Dekker,
J. G. Cederquist,
Jason Crampton,
Sandro Etalle:
Extended privilege inheritance in RBAC.
ASIACCS 2007: 383-385 |
9 | EE | J. G. Cederquist,
Ricardo Corin,
M. A. C. Dekker,
Sandro Etalle,
J. I. den Hartog,
Gabriele Lenzini:
Audit-based compliance control.
Int. J. Inf. Sec. 6(2-3): 133-151 (2007) |
2006 |
8 | EE | Jan Cederquist,
Muhammad Torabi Dashti:
An intruder model for verifying liveness in security protocols.
FMSE 2006: 23-32 |
2005 |
7 | EE | J. G. Cederquist,
Ricardo Corin,
Muhammad Torabi Dashti:
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol.
ICICS 2005: 27-39 |
6 | EE | J. G. Cederquist,
Ricardo Corin,
M. A. C. Dekker,
Sandro Etalle,
J. I. den Hartog:
An Audit Logic for Accountability.
POLICY 2005: 34-43 |
5 | EE | J. G. Cederquist,
Ricardo Corin,
M. A. C. Dekker,
Sandro Etalle,
J. I. den Hartog:
An Audit Logic for Accountability
CoRR abs/cs/0502091: (2005) |
2004 |
4 | EE | Jan Cederquist,
Muhammad Torabi Dashti:
Formal Analysis of a Fair Payment Protocol.
Formal Aspects in Security and Trust 2004: 41-54 |
3 | EE | Gilles Barthe,
Jan Cederquist,
Sabrina Tarento:
A Machine-Checked Formalization of the Generic Model and the Random Oracle Model.
IJCAR 2004: 385-399 |
1996 |
2 | | Jan Cederquist:
An Implementation of the Heine-Borel Covering Theorem in Type Theory.
TYPES 1996: 46-65 |
1995 |
1 | EE | Jan Cederquist,
Sara Negri:
A Constructive Proof of the Heine-Borel Covering Theorem for Formal Reals.
TYPES 1995: 62-75 |