dblp.uni-trier.dewww.uni-trier.de

Cas J. F. Cremers

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
14EECas J. F. Cremers: Unbounded verification, falsification, and characterization of security protocols by pattern refinement. ACM Conference on Computer and Communications Security 2008: 119-128
13EECas J. F. Cremers: On the protocol composition logic PCL. ASIACCS 2008: 66-76
12EECas J. F. Cremers: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. CAV 2008: 414-418
11EESuzana Andova, Cas J. F. Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic: A framework for compositional verification of security protocols. Inf. Comput. 206(2-4): 425-459 (2008)
2007
10EECas J. F. Cremers: Complete Characterization of Security Protocols by Pattern Refinement. Formal Protocol Verification Applied 2007
9EECas J. F. Cremers: On the Protocol Composition Logic PCL CoRR abs/0709.1080: (2007)
2006
8EECas J. F. Cremers: Feasibility of Multi-Protocol Attacks. ARES 2006: 287-294
7EESuzana Andova, Cas J. F. Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic: A framework for compositional verification of security protocols CoRR abs/cs/0611062: (2006)
6EECas J. F. Cremers: Compositionality of Security Protocols: A Research Agenda. Electr. Notes Theor. Comput. Sci. 142: 99-110 (2006)
5EESjouke Mauw, Valérie Issarny, Cas J. F. Cremers: Preface. Electr. Notes Theor. Comput. Sci. 157(3): 1-2 (2006)
4EECas J. F. Cremers, Sjouke Mauw, Erik P. de Vink: Injective synchronisation: An extension of the authentication hierarchy. Theor. Comput. Sci. 367(1-2): 139-161 (2006)
2005
3EECas J. F. Cremers, Sjouke Mauw, Erik P. de Vink: A Syntactic Criterion for Injectivity of Authentication Protocols. Electr. Notes Theor. Comput. Sci. 135(1): 23-38 (2005)
2004
2EECas J. F. Cremers, Sjouke Mauw: Checking Secrecy by Means of Partial Order Reduction. SAM 2004: 171-188
2003
1EECas J. F. Cremers, Sjouke Mauw: Operational Semantics of Security Protocols. Scenarios: Models, Transformations and Tools 2003: 66-89

Coauthor Index

1Suzana Andova [7] [11]
2Kristian Gjøsteen [7] [11]
3Valérie Issarny [5]
4Sjouke Mauw [1] [2] [3] [4] [5] [7] [11]
5Stig Fr. Mjølsnes [7] [11]
6Sasa Radomirovic [7] [11]
7Erik P. de Vink [3] [4]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)