![]() |
| 2002 | ||
|---|---|---|
| 10 | EE | Raphael Yahalom: Protocols with Certified-Transfer Servers. Security Protocols Workshop 2002: 145-157 |
| 1999 | ||
| 9 | EE | Raphael Yahalom, Stuart E. Madnick: e-Commerce Bargain-Hunting with an UnBun Model. CoopIS 1999: 186-196 |
| 1998 | ||
| 8 | EE | Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne: Discussion Session: Differences Between Academic and Commercial Security. Security Protocols Workshop 1998: 177-192 |
| 7 | EE | Raphael Yahalom: Optimistic Trust with Realistic eNvestigators (Position Paper). Security Protocols Workshop 1998: 193-202 |
| 6 | EE | Raphael Yahalom: Optimistic Trust with Realistic eNvestigators (Transcript of Discussion). Security Protocols Workshop 1998: 203-212 |
| 1994 | ||
| 5 | Raphael Yahalom, Birgit Klein, Thomas Beth: Trust-Based Navigation in Distribution Systems. Computing Systems 7(1): 45-73 (1994) | |
| 4 | Raphael Yahalom: Secure Timeliness: On the Cost of Non-Synchronized Clocks. Computing Systems 7(4): 451-465 (1994) | |
| 1993 | ||
| 3 | EE | Raphael Yahalom: Optimality of Multi-Domain Protocols. ACM Conference on Computer and Communications Security 1993: 38-48 |
| 2 | Raphael Yahalom: Optimality of Asynchronous Two-Party Secure Data-Exchange Protocols. Journal of Computer Security 2(2-3): 191-210 (1993) | |
| 1990 | ||
| 1 | Li Gong, Roger M. Needham, Raphael Yahalom: Reasoning about Belief in Cryptographic Protocols. IEEE Symposium on Security and Privacy 1990: 234-248 | |
| 1 | Thomas Beth | [5] |
| 2 | Virgil D. Gligor | [8] |
| 3 | Li Gong | [1] |
| 4 | Birgit Klein | [5] |
| 5 | Peter Landrock | [8] |
| 6 | T. Mark A. Lomas | [8] |
| 7 | Stuart E. Madnick | [9] |
| 8 | Roger M. Needham | [1] |
| 9 | John P. Warne | [8] |