2008 |
9 | EE | Stéphanie Delaune,
Steve Kremer,
Graham Steel:
Formal Analysis of PKCS#11.
CSF 2008: 331-344 |
2007 |
8 | EE | Véronique Cortier,
Stéphanie Delaune,
Graham Steel:
A Formal Theory of Key Conjuring.
CSF 2007: 79-96 |
7 | EE | Véronique Cortier,
Gavin Keighren,
Graham Steel:
Automatic Analysis of the Security of XOR-Based Key Management Schemes.
TACAS 2007: 538-552 |
2006 |
6 | EE | Graham Steel,
Alan Bundy:
Attacking Group Protocols by Refuting Incorrect Inductive Conjectures.
J. Autom. Reasoning 36(1-2): 149-176 (2006) |
5 | EE | Graham Steel:
Formal analysis of PIN block attacks.
Theor. Comput. Sci. 367(1-2): 257-270 (2006) |
2005 |
4 | EE | Graham Steel:
Deduction with XOR Constraints in Security API Modelling.
CADE 2005: 322-336 |
3 | EE | Graham Steel:
The Importance of Non-theorems and Counterexamples in Program Verification.
VSTTE 2005: 491-495 |
2 | EE | Graham Steel,
Alan Bundy:
Attacking Group Multicast Key Management Protocols Using Coral.
Electr. Notes Theor. Comput. Sci. 125(1): 125-144 (2005) |
2004 |
1 | EE | Graham Steel,
Alan Bundy,
Monika Maidl:
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures.
IJCAR 2004: 137-151 |