Author:
Rudolph Carsten,Compagna Luca,Carbone Roberto,Muñoz Antonio,Repp Jürgen
Reference24 articles.
1. Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuellar J, Drielsma PH, Heám P, Kouchnarenko O, Mantovani J, Mödersheim S, von Oheimb D, Rusinowitch M, Santiago J, Turuani M, Viganò L, Vigneron L (2005) The Avispa tool for the automated validation of internet security protocols and applications. In: Proceedings of CAV 2005, Computer Aided Verification, Springer Verlag, Lecture Notes in Computer Science, vol 3576
2. Armando A, Carbone R, Compagna L (2007) LTL Model Checking for Security Protocols. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium (CSF20), July 6–8, 2007, Venice, Italy, Springer Verlag, LNCS
3. Armando A, Carbone R, Compagna L, Cuellar J, Tobarra L (2008) Formal analysis of saml 2.0 web browser single sign-on: Breaking the saml-based single sign-on for google apps. In: Proceedings of FMSE 2008, Formal Methods in Security Engineering, ACM
4. AVANTSSAR (2008) The AVANTSSAR Project. www.avantssar.eu/
5. AVISPA (2007) The AVISPA Project. www.avispa-project.org/
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Detection of Anonymising Proxies Using Machine Learning;International Journal of Digital Crime and Forensics;2021-11
2. Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses;International Journal of Digital Crime and Forensics;2021-11