dblp.uni-trier.dewww.uni-trier.de

Graham Steel

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
9EEStéphanie Delaune, Steve Kremer, Graham Steel: Formal Analysis of PKCS#11. CSF 2008: 331-344
2007
8EEVéronique Cortier, Stéphanie Delaune, Graham Steel: A Formal Theory of Key Conjuring. CSF 2007: 79-96
7EEVéronique Cortier, Gavin Keighren, Graham Steel: Automatic Analysis of the Security of XOR-Based Key Management Schemes. TACAS 2007: 538-552
2006
6EEGraham Steel, Alan Bundy: Attacking Group Protocols by Refuting Incorrect Inductive Conjectures. J. Autom. Reasoning 36(1-2): 149-176 (2006)
5EEGraham Steel: Formal analysis of PIN block attacks. Theor. Comput. Sci. 367(1-2): 257-270 (2006)
2005
4EEGraham Steel: Deduction with XOR Constraints in Security API Modelling. CADE 2005: 322-336
3EEGraham Steel: The Importance of Non-theorems and Counterexamples in Program Verification. VSTTE 2005: 491-495
2EEGraham Steel, Alan Bundy: Attacking Group Multicast Key Management Protocols Using Coral. Electr. Notes Theor. Comput. Sci. 125(1): 125-144 (2005)
2004
1EEGraham Steel, Alan Bundy, Monika Maidl: Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures. IJCAR 2004: 137-151

Coauthor Index

1Alan Bundy [1] [2] [6]
2Véronique Cortier [7] [8]
3Stéphanie Delaune [8] [9]
4Gavin Keighren [7]
5Steve Kremer [9]
6Monika Maidl [1]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)