Követés
Cas Cremers
Cas Cremers
CISPA Helmholtz Center for Information Security
E-mail megerősítve itt: cispa.de - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
The scyther tool: Verification, falsification, and analysis of security protocols: Tool paper
CJF Cremers
International conference on computer aided verification, 414-418, 2008
9212008
The Tamarin prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification, 696-701, 2013
8182013
Handbook of model checking
EM Clarke, TA Henzinger, H Veith, R Bloem, PA Abdulla, R Alur, C Baier, ...
Springer, 2018
7222018
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33, 1914-1983, 2020
4482020
Scyther: Semantics and verification of security protocols
CJF Cremers
Dissertation Abstracts International 68 (02), 2006
3782006
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
3422020
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
3232012
A comprehensive symbolic analysis of TLS 1.3
C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
2762017
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE symposium on security and privacy, 113-127, 2012
2222012
On post-compromise security
K Cohn-Gordon, C Cremers, L Garratt
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 164-178, 2016
2142016
Security properties
C Cremers, S Mauw, C Cremers, S Mauw
Operational Semantics and Verification of Security Protocols, 37-65, 2012
2122012
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
185*2014
On ends-to-ends encryption: Asynchronous group messaging with strong security guarantees
K Cohn-Gordon, C Cremers, L Garratt, J Millican, K Milner
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1712018
SoK: Computer-aided cryptography
M Barbosa, G Barthe, K Bhargavan, B Blanchet, C Cremers, K Liao, ...
2021 IEEE symposium on security and privacy (SP), 777-795, 2021
1692021
Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication
C Cremers, M Horvat, S Scott, T van der Merwe
2016 IEEE Symposium on Security and Privacy (SP), 470-485, 2016
1522016
Model checking security protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
1342018
Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion
C Cremers, M Dehnel-Wild
Network and Distributed System Security Symposium (NDSS), 2019
1242019
Provably repairing the ISO/IEC 9798 standard for entity authentication
D Basin, C Cremers, S Meier
Journal of Computer Security 21 (6), 817-846, 2013
1222013
Comparing state spaces in automatic security protocol analysis
CJF Cremers, P Lafourcade, P Nadeau
Formal to Practical Security: Papers Issued from the 2005-2008 French …, 2009
1172009
Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2
C Cremers
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
1162011
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20