Követés
David Basin
David Basin
Professor of Computer Science, ETH Zurich
E-mail megerősítve itt: inf.ethz.ch - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
15582005
SecureUML: A UML-based modeling language for model-driven security
T Lodderstedt, D Basin, J Doser
International Conference on the Unified Modeling Language, 426-441, 2002
11732002
The TAMARIN prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
7932013
Model driven security: From UML models to access control infrastructures
D Basin, J Doser, T Lodderstedt
ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (1), 39-91, 2006
7152006
Handbook of model checking
EM Clarke, TA Henzinger, H Veith, R Bloem
Springer 10, 978-3, 2018
6872018
OFMC: A symbolic model checker for security protocols
D Basin, S Mödersheim, L Vigano
International Journal of Information Security 4, 181-208, 2005
6592005
An information-theoretic model for adaptive side-channel attacks
B Köpf, D Basin
Proceedings of the 14th ACM conference on Computer and communications …, 2007
4542007
A formal analysis of 5G authentication
D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
4152018
Distributed usage control
A Pretschner, M Hilty, D Basin
Communications of the ACM 49 (9), 39-44, 2006
3422006
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
3402020
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
3192012
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
Computer Security–ESORICS 2003: 8th European Symposium on Research in …, 2003
2572003
A policy language for distributed usage control
M Hilty, A Pretschner, D Basin, C Schaefer, T Walter
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
2322007
Rippling: meta-level guidance for mathematical reasoning
A Bundy, D Basin, D Hutter, A Ireland
Cambridge Univ Press, 2005
2172005
Monitoring metric first-order temporal properties
D Basin, F Klaedtke, S Müller, E Zălinescu
Journal of the ACM (JACM) 62 (2), 1-45, 2015
2072015
Model driven security for process-oriented systems
D Basin, J Doser, T Lodderstedt
Proceedings of the eighth ACM symposium on Access control models and …, 2003
2022003
Sok: Secure data deletion
J Reardon, D Basin, S Capkun
2013 IEEE symposium on security and privacy, 301-315, 2013
2012013
On obligations
M Hilty, D Basin, A Pretschner
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
1812005
Automated analysis of security-design models
D Basin, M Clavel, J Doser, M Egea
Information and Software Technology 51 (5), 815-831, 2009
1702009
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1692014
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20