| 2007 |
| 26 | EE | Shaddin F. Doghmi,
Joshua D. Guttman,
F. Javier Thayer:
Completeness of the Authentication Tests.
ESORICS 2007: 106-121 |
| 25 | EE | Shaddin F. Doghmi,
Joshua D. Guttman,
F. Javier Thayer:
Searching for Shapes in Cryptographic Protocols.
TACAS 2007: 523-537 |
| 24 | EE | Shaddin F. Doghmi,
Joshua D. Guttman,
F. Javier Thayer:
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions.
Electr. Notes Theor. Comput. Sci. 173: 85-102 (2007) |
| 2004 |
| 23 | EE | Joshua D. Guttman,
F. Javier Thayer,
Jay A. Carlson,
Jonathan C. Herzog,
John D. Ramsdell,
Brian T. Sniffen:
Trust Management in Strand Spaces: A Rely-Guarantee Method.
ESOP 2004: 325-339 |
| 22 | | Joshua D. Guttman,
F. Javier Thayer,
Lenore D. Zuck:
The faithfulness of abstract protocol analysis: Message authentication.
Journal of Computer Security 12(6): 865-891 (2004) |
| 2002 |
| 21 | EE | Joshua D. Guttman,
F. Javier Thayer:
Authentication tests and the structure of bundles.
Theor. Comput. Sci. 283(2): 333-380 (2002) |
| 2001 |
| 20 | EE | Joshua D. Guttman,
F. Javier Thayer,
Lenore D. Zuck:
The faithfulness of abstract protocol analysis: message authentication.
ACM Conference on Computer and Communications Security 2001: 186-195 |
| 2000 |
| 19 | EE | Joshua D. Guttman,
F. Javier Thayer:
Protocol Independence through Disjoint Encryption.
CSFW 2000: 24-34 |
| 18 | EE | Joshua D. Guttman,
Amy L. Herzog,
F. Javier Thayer:
Authentication and Confidentiality via IPSEC.
ESORICS 2000: 255-272 |
| 17 | EE | Joshua D. Guttman,
F. Javier Thayer:
Authentication Tests.
IEEE Symposium on Security and Privacy 2000: 96-109 |
| 1999 |
| 16 | EE | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Mixed Strand Spaces.
CSFW 1999: 72-82 |
| 15 | | Vipin Swarup,
F. Javier Thayer:
Trust: Benefits, Models, and Mechanisms.
Secure Internet Programming 1999: 3-18 |
| 14 | | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Strand Spaces: Proving Security Protocols Correct.
Journal of Computer Security 7(1): (1999) |
| 1998 |
| 13 | EE | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Honest Ideals on Strand Spaces.
CSFW 1998: 66-77 |
| 12 | EE | F. Javier Thayer,
Jonathan C. Herzog,
Joshua D. Guttman:
Strand Spaces: Why is a Security Protocol Correct?
IEEE Symposium on Security and Privacy 1998: 160-171 |
| 1996 |
| 11 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: An Updated System Description.
CADE 1996: 298-302 |
| 1995 |
| 10 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
Context in Mathematical Reasoning and Computation.
J. Symb. Comput. 19(1-3): 210-206 (1995) |
| 1994 |
| 9 | | William M. Farmer,
Joshua D. Guttman,
Mark E. Nadel,
F. Javier Thayer:
Proof Script Pragmatics in IMPS.
CADE 1994: 356-370 |
| 1993 |
| 8 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
Reasoning with Contexts.
DISCO 1993: 216-228 |
| 7 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: An Interactive Mathematical Proof System.
J. Autom. Reasoning 11(2): 213-248 (1993) |
| 1992 |
| 6 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
Little Theories.
CADE 1992: 567-581 |
| 5 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: System Description.
CADE 1992: 701-705 |
| 1990 |
| 4 | | William M. Farmer,
Joshua D. Guttman,
F. Javier Thayer:
IMPS: An Interactive Mathematical Proof System.
CADE 1990: 653-654 |
| 1989 |
| 3 | | Dale M. Johnson,
F. Javier Thayer:
Security Properties Consistent with the Testing Semantics for Communicating Processes.
CSFW 1989: 9-21 |
| 1988 |
| 2 | | Dale M. Johnson,
F. Javier Thayer:
Security and the Composition of Machines.
CSFW 1988: 72-89 |
| 1 | EE | Dale M. Johnson,
F. Javier Thayer:
Stating Security Requirements with Tolerable Sets.
ACM Trans. Comput. Syst. 6(3): 284-295 (1988) |