2007 |
26 | EE | Shaddin F. Doghmi,
Joshua D. Guttman,
F. Javier Thayer:
Completeness of the Authentication Tests.
ESORICS 2007: 106-121 |
25 | EE | Shaddin F. Doghmi,
Joshua D. Guttman,
F. Javier Thayer:
Searching for Shapes in Cryptographic Protocols.
TACAS 2007: 523-537 |
24 | EE | Shaddin F. Doghmi,
Joshua D. Guttman,
F. Javier Thayer:
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions.
Electr. Notes Theor. Comput. Sci. 173: 85-102 (2007) |
2004 |
23 | EE | Joshua D. Guttman,
F. Javier Thayer,
Jay A. Carlson,
Jonathan C. Herzog,
John D. Ramsdell,
Brian T. Sniffen:
Trust Management in Strand Spaces: A Rely-Guarantee Method.
ESOP 2004: 325-339 |
22 | | Joshua D. Guttman,
F. Javier Thayer,
Lenore D. Zuck:
The faithfulness of abstract protocol analysis: Message authentication.
Journal of Computer Security 12(6): 865-891 (2004) |
2002 |
21 | EE | Joshua D. Guttman,
F. Javier Thayer:
Authentication tests and the structure of bundles.
Theor. Comput. Sci. 283(2): 333-380 (2002) |
2001 |
20 | EE | Joshua D. Guttman,
F. Javier Thayer,
Lenore D. Zuck:
The faithfulness of abstract protocol analysis: message authentication.
ACM Conference on Computer and Communications Security 2001: 186-195 |
2000 |
19 | EE | Joshua D. Guttman,
F. Javier Thayer:
Protocol Independence through Disjoint Encryption.
CSFW 2000: 24-34 |
18 | EE | Joshua D. Guttman,
Amy L. Herzog,
F. Javier Thayer:
Authentication and Confidentiality via IPSEC.
ESORICS 2000: 255-272 |
17 | EE | Joshua D. Guttman,
F. Javier Thayer:
Authentication Tests.
IEEE Symposium on Security and Privacy 2000: 96-109 |
1999 |
16 | EE | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Mixed Strand Spaces.
CSFW 1999: 72-82 |
15 | | Vipin Swarup,
F. Javier Thayer:
Trust: Benefits, Models, and Mechanisms.
Secure Internet Programming 1999: 3-18 |
14 | | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Strand Spaces: Proving Security Protocols Correct.
Journal of Computer Security 7(1): (1999) |
1998 |
13 | EE | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Honest Ideals on Strand Spaces.
CSFW 1998: 66-77 |
12 | EE | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Strand Spaces: Why is a Security Protocol Correct?
IEEE Symposium on Security and Privacy 1998: 160-171 |
1996 |
11 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: An Updated System Description.
CADE 1996: 298-302 |
1995 |
10 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
Context in Mathematical Reasoning and Computation.
J. Symb. Comput. 19(1-3): 210-206 (1995) |
1994 |
9 | | William M. Farmer,
Joshua D. Guttman,
Mark E. Nadel,
F. Javier Thayer:
Proof Script Pragmatics in IMPS.
CADE 1994: 356-370 |
1993 |
8 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
Reasoning with Contexts.
DISCO 1993: 216-228 |
7 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: An Interactive Mathematical Proof System.
J. Autom. Reasoning 11(2): 213-248 (1993) |
1992 |
6 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
Little Theories.
CADE 1992: 567-581 |
5 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: System Description.
CADE 1992: 701-705 |
1990 |
4 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: An Interactive Mathematical Proof System.
CADE 1990: 653-654 |
1989 |
3 | | Dale M. Johnson,
F. Javier Thayer:
Security Properties Consistent with the Testing Semantics for Communicating Processes.
CSFW 1989: 9-21 |
1988 |
2 | | Dale M. Johnson,
F. Javier Thayer:
Security and the Composition of Machines.
CSFW 1988: 72-89 |
1 | EE | Dale M. Johnson,
F. Javier Thayer:
Stating Security Requirements with Tolerable Sets.
ACM Trans. Comput. Syst. 6(3): 284-295 (1988) |