2007 | ||
---|---|---|
7 | EE | Benjamin W. Long, Colin J. Fidge, David A. Carrington: Cross-Layer Verification of Type Flaw Attacks on Security Protocols. ACSC 2007: 171-180 |
2006 | ||
6 | EE | Benjamin W. Long, Colin J. Fidge: Formally Analysing a Security Protocol for Replay Attacks. ASWEC 2006: 171-180 |
2005 | ||
5 | EE | Benjamin W. Long: Formal Verification of a Type Flaw Attack on a Security Protocol Using Object-Z. ZB 2005: 319-333 |
2003 | ||
4 | EE | Benjamin W. Long: Formalising Key-Distribution in the Presence of Trust using Object-Z. ACSW Frontiers 2003: 59-66 |
3 | EE | Benjamin W. Long: Formal Verification of Type Flaw Attacks in Security Protocols. APSEC 2003: 415-424 |
2 | EE | Benjamin W. Long, Colin J. Fidge, Antonio Cerone: A Z Based Approach to Verifying Security Protocols. ICFEM 2003: 375-395 |
1 | EE | Brad Long, Benjamin W. Long: Formal Specification of Java Concurrency to Assist Software Verification. IPDPS 2003: 136 |
1 | David A. Carrington | [7] |
2 | Antonio Cerone | [2] |
3 | Colin J. Fidge | [2] [6] [7] |
4 | Brad Long | [1] |