Cas Cremers
Cas Cremers
Professor of Computer Science, CISPA Helmholtz Center for Information Security
Geverifieerd e-mailadres voor cispa.saarland - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
The Scyther Tool: Verification, falsification, and analysis of security protocols
CJF Cremers
International conference on computer aided verification, 414-418, 2008
5552008
The Tamarin prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification, 696-701, 2013
3592013
Scyther: Semantics and verification of security protocols
CJF Cremers
Dissertation Abstracts International 68 (02), 2006
2322006
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
2152012
Handbook of model checking
EM Clarke, TA Henzinger, H Veith, R Bloem, PA Abdulla, R Alur, C Baier, ...
Springer, 2018
1872018
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33 (4), 1914-1983, 2020
1832020
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE Symposium on Security and Privacy, 113-127, 2012
1712012
Security properties
C Cremers, S Mauw
Operational Semantics and Verification of Security Protocols, 37-65, 2012
1272012
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
125*2014
Provably repairing the ISO/IEC 9798 standard for entity authentication
D Basin, C Cremers, S Meier
Journal of Computer Security 21 (6), 817-846, 2013
1002013
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
CJF Cremers
Proceedings of the 15th ACM conference on Computer and communications …, 2008
942008
A framework for compositional verification of security protocols
S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović
Information and Computation 206 (2-4), 425-459, 2008
92*2008
A comprehensive symbolic analysis of TLS 1.3
C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
882017
Comparing state spaces in automatic security protocol analysis
CJF Cremers, P Lafourcade, P Nadeau
Formal to Practical Security, 70-94, 2009
872009
On post-compromise security
K Cohn-Gordon, C Cremers, L Garratt
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 164-178, 2016
862016
Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2
C Cremers
European Symposium on Research in Computer Security, 315-334, 2011
812011
Operational semantics of security protocols
C Cremers, S Mauw
Scenarios: Models, Transformations and Tools, 66-89, 2005
792005
Model checking security protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
782018
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
CJF Cremers
International Conference on Applied Cryptography and Network Security, 20-33, 2009
752009
Examining indistinguishability-based security models for key exchange protocols: the case of CK, CK-HMQV, and eCK
C Cremers
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
722011
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20