Author of the publication

SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis.

, , and . FME, volume 2805 of Lecture Notes in Computer Science, page 875-893. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Validating Security Protocols under the General Attacker., , , and . ARSPA-WITS, volume 5511 of Lecture Notes in Computer Science, page 34-51. Springer, (2009)Bulwark: Holistic and Verified Security Monitoring of Web Protocols., , and . ESORICS (1), volume 12308 of Lecture Notes in Computer Science, page 23-41. Springer, (2020)From Research Results to Strategy: A Mapping Exercise., , and . ISSE, page 256-264. Springer, (2014)System Description: RDL : Rewrite and Decision Procedure Laboratory., , and . IJCAR, volume 2083 of Lecture Notes in Computer Science, page 663-669. Springer, (2001)SATMC: A SAT-Based Model Checker for Security-Critical Systems., , and . TACAS, volume 8413 of Lecture Notes in Computer Science, page 31-45. Springer, (2014)How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns., , , , and . Artif. Intell. Law, 17 (1): 1-30 (2009)Large-Scale Analysis & Detection of Authentication Cross-Site Request Forgeries., , , , , and . EuroS&P, page 350-365. IEEE, (2017)Testability Tarpits: the Impact of Code Patterns on the Security Testing of Web Applications., , , , and . NDSS, The Internet Society, (2022)A preliminary study on the adoption and effectiveness of SameSite cookies as a CSRF defence., , , , and . EuroS&P Workshops, page 49-59. IEEE, (2021)CSRFing the SSO Waves: Security Testing of SSO-Based Account Linking Process., , , , , and . EuroS&P, page 139-154. IEEE, (2024)