Cas Cremers
Cas Cremers
CISPA Helmholtz Center for Information Security, Germany
Verifierad e-postadress på cispa.saarland - Startsida
TitelCiteras avÅr
The Scyther Tool: Verification, falsification, and analysis of security protocols
CJF Cremers
International Conference on Computer Aided Verification, 414-418, 2008
4762008
The Tamarin prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification, 696-701, 2013
2672013
Scyther: Semantics and verification of security protocols
CJF Cremers
Dissertation Abstracts International 68 (02), 2006
2082006
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
1922012
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE Symposium on Security and Privacy, 113-127, 2012
1472012
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 451-466, 2017
1292017
Security properties
C Cremers, S Mauw
Operational Semantics and Verification of Security Protocols, 37-65, 2012
1052012
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1002014
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
CJF Cremers
Proceedings of the 15th ACM conference on Computer and communications …, 2008
922008
A framework for compositional verification of security protocols
S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović
Information and Computation 206 (2-4), 425-459, 2008
90*2008
Provably repairing the ISO/IEC 9798 standard for entity authentication
D Basin, C Cremers, S Meier
Journal of Computer Security 21 (6), 817-846, 2013
852013
Comparing state spaces in automatic security protocol analysis
CJF Cremers, P Lafourcade, P Nadeau
Formal to Practical Security, 70-94, 2009
802009
Operational semantics of security protocols
C Cremers, S Mauw
Scenarios: Models, Transformations and Tools, 66-89, 2005
782005
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
CJF Cremers
International Conference on Applied Cryptography and Network Security, 20-33, 2009
702009
Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2
C Cremers
European Symposium on Research in Computer Security, 315-334, 2011
692011
Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK
C Cremers
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
682011
Feasibility of multi-protocol attacks
C Cremers
First International Conference on Availability, Reliability and Security …, 2006
662006
On post-compromise security
K Cohn-Gordon, C Cremers, L Garratt
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 164-178, 2016
642016
Modeling and analyzing security in the presence of compromising adversaries
D Basin, C Cremers
European Symposium on Research in Computer Security, 340-356, 2010
632010
Injective synchronisation: an extension of the authentication hierarchy
CJF Cremers, S Mauw, EP de Vink
Theoretical Computer Science 367 (1-2), 139-161, 2006
622006
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20