Sebastian Alexander Mödersheim
Sebastian Alexander Mödersheim
Associate Professor of Computer Science, Denmark's Technical University
Email confirmado em - Página inicial
Citado por
Citado por
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
Computer Security–ESORICS 2003, 253-270, 2003
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, P Hankes Drielsma, J Mantovani, ...
Proceedings of workshop on specification and automated processing of …, 2004
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification, 349-354, 2002
Secure pseudonymous channels
S Mödersheim, L Viganò
European Symposium on Research in Computer Security, 337-354, 2009
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
M Backes, S Mödersheim, B Pfitzmann, L Vigano
International Conference on Foundations of Software Science and Computation …, 2006
The open-source fixed-point model checker for symbolic analysis of security protocols
S Mödersheim, L Vigano
Foundations of Security Analysis and Design V, 166-194, 2009
Algebraic properties in alice and bob notation
S Mödersheim
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
CDiff: a new reduction technique for constraint-based analysis of security protocols
D Basin, S Mödersheim, L Vigano
Proceedings of the 10th ACM conference on Computer and communications …, 2003
A formal model of identity mixer
J Camenisch, S Mödersheim, D Sommer
Formal Methods for Industrial Critical Systems, 198-214, 2010
Abstraction by set-membership: verifying security protocols and web services with databases
SA Mödersheim
ACM Conference on Computer and Communications Security 17, 351-360, 2010
A card requirements language enabling privacy-preserving access control
J Camenisch, S Mödersheim, G Neven, FS Preiss, D Sommer
Proceeding of the 15th ACM symposium on Access control models and …, 2010
Algebraic intruder deductions
D Basin, S Mödersheim, L Vigano
Logic for Programming, Artificial Intelligence, and Reasoning, 549-564, 2005
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
S Mödersheim, L Vigano, D Basin
Journal of Computer Security 18 (4), 575-618, 2010
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
ASLan++—a formal security specification language for distributed systems
D Oheimb, S Mödersheim
International Symposium on Formal Methods for Components and Objects, 1-22, 2010
Vertical Protocol Composition
T Groß, S Mödersheim
24th IEEE Computer Security Foundations Workshop (CSF 2011), 2011
Automated verification of virtualized infrastructures
S Bleikertz, T Groß, S Mödersheim
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 47-58, 2011
Avispa v1. 1 user manual
TA Team
Information society technologies programme (June 2006) http://avispa-project …, 2006
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20