Follow
Tajana Ban Kirigin
Title
Cited by
Cited by
Year
Bounded memory Dolev-Yao adversaries in collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Information and computation, Special issue on Security and Rewriting …, 2014
262014
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
4th Conference on Principles of Security and Trust (POST), Springer LNCS …, 2015
222015
Time, computational complexity, and probability in the analysis of distance-bounding protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Journal of Computer Security 25 (6), 585-630, 2017
212017
A Rewriting Framework for Activities Subject to Regulations.
MI Kanovich, T Ban Kirigin, V Nigam, A Scedrov, CL Talcott, R Perovic
RTA 15, 305-322, 2012
202012
Resource-bounded intruders in denial of service attacks
AA Urquiza, MA AlTurki, M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, ...
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 382-38214, 2019
182019
A rewriting framework and logic for activities subject to regulations
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott, R Perovic
Mathematical Structures in Computer Science, 2015
172015
Timed multiset rewriting and the verification of time-sensitive distributed systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
International Conference on Formal Modeling and Analysis of Timed Systems …, 2016
142016
Bounded memory protocols and progressing collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Computer Security–ESORICS 2013, Springer LNCS 8134, 309-326, 2013
142013
Lexical sense labeling and sentiment potential analysis using corpus-based dependency graph
T Ban Kirigin, S Bujačić Babić, B Perak
Mathematics 9 (12), 1449, 2021
112021
Statistical model checking of distance fraud attacks on the Hancke-Kuhn family of protocols
MA Alturki, M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Proceedings of the 2018 workshop on cyber-physical systems security and …, 2018
112018
Towards Timed Models for Cyber-Physical Security Protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Joint Workshop on Foundations of Computer Security and Formal and …, 2014
112014
Bounded memory Dolev-Yao adversaries in collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Formal Aspects of Security and Trust, 18-33, 2011
112011
A multiset rewriting model for specifying and verifying timing aspects of security protocols
MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, A Scedrov, C Talcott
Foundations of Security, Protocols, and Equational Reasoning, 192-213, 2019
102019
Progressing collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Advances in computer science: an international journal 3 (3), 78-86, 2014
9*2014
Towards an automated assistant for clinical investigations
V Nigam, T Ban Kirigin, A Scedrov, C Talcott, M Kanovich, R Perovic
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
92012
Progressing collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Workshop on Foundations of Security and Privacy (FCS-PrivMod 2010), 2010
92010
Resource and timing aspects of security protocols
A Aires Urquiza, MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, ...
Journal of computer security 29 (3), 299-340, 2021
82021
Towards a formal model of language networks
T Ban Kirigin, A Meštrović, S Martinčić-Ipšić
International Conference on Information and Software Technologies, 469-479, 2015
82015
Bounded Memory Protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Computer languages systems & structures (1477-8424) 40 (3-4), 137-154, 2014
82014
On the Complexity of Verification of Time-Sensitive Distributed Systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Protocols, Strands, and Logic, 251-275, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20