2008 |
14 | EE | Cas J. F. Cremers:
Unbounded verification, falsification, and characterization of security protocols by pattern refinement.
ACM Conference on Computer and Communications Security 2008: 119-128 |
13 | EE | Cas J. F. Cremers:
On the protocol composition logic PCL.
ASIACCS 2008: 66-76 |
12 | EE | Cas J. F. Cremers:
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols.
CAV 2008: 414-418 |
11 | EE | Suzana Andova,
Cas J. F. Cremers,
Kristian Gjøsteen,
Sjouke Mauw,
Stig Fr. Mjølsnes,
Sasa Radomirovic:
A framework for compositional verification of security protocols.
Inf. Comput. 206(2-4): 425-459 (2008) |
2007 |
10 | EE | Cas J. F. Cremers:
Complete Characterization of Security Protocols by Pattern Refinement.
Formal Protocol Verification Applied 2007 |
9 | EE | Cas J. F. Cremers:
On the Protocol Composition Logic PCL
CoRR abs/0709.1080: (2007) |
2006 |
8 | EE | Cas J. F. Cremers:
Feasibility of Multi-Protocol Attacks.
ARES 2006: 287-294 |
7 | EE | Suzana Andova,
Cas J. F. Cremers,
Kristian Gjøsteen,
Sjouke Mauw,
Stig Fr. Mjølsnes,
Sasa Radomirovic:
A framework for compositional verification of security protocols
CoRR abs/cs/0611062: (2006) |
6 | EE | Cas J. F. Cremers:
Compositionality of Security Protocols: A Research Agenda.
Electr. Notes Theor. Comput. Sci. 142: 99-110 (2006) |
5 | EE | Sjouke Mauw,
Valérie Issarny,
Cas J. F. Cremers:
Preface.
Electr. Notes Theor. Comput. Sci. 157(3): 1-2 (2006) |
4 | EE | Cas J. F. Cremers,
Sjouke Mauw,
Erik P. de Vink:
Injective synchronisation: An extension of the authentication hierarchy.
Theor. Comput. Sci. 367(1-2): 139-161 (2006) |
2005 |
3 | EE | Cas J. F. Cremers,
Sjouke Mauw,
Erik P. de Vink:
A Syntactic Criterion for Injectivity of Authentication Protocols.
Electr. Notes Theor. Comput. Sci. 135(1): 23-38 (2005) |
2004 |
2 | EE | Cas J. F. Cremers,
Sjouke Mauw:
Checking Secrecy by Means of Partial Order Reduction.
SAM 2004: 171-188 |
2003 |
1 | EE | Cas J. F. Cremers,
Sjouke Mauw:
Operational Semantics of Security Protocols.
Scenarios: Models, Transformations and Tools 2003: 66-89 |