The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ... Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012 | 144 | 2012 |
SECFUZZ: Fuzz-testing security protocols P Tsankov, MT Dashti, D Basin 2012 7th International Workshop on Automation of Software Test (AST), 1-7, 2012 | 109 | 2012 |
A hybrid PKI-IBC based ephemerizer system SK Nair, MT Dashti, B Crispo, AS Tanenbaum New Approaches for Security, Privacy and Trust in Complex Environments …, 2007 | 55 | 2007 |
A Framework for Automatically Checking Anonymity with μCRL T Chothia, S Orzan, J Pang, M Torabi Dashti Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007 | 49 | 2007 |
Vera: A flexible model-based vulnerability testing tool A Blome, M Ochoa, K Li, M Peroli, MT Dashti 2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013 | 35 | 2013 |
Distributed Analysis with μCRL: A Compendium of Case Studies S Blom, JR Calamé, B Lisser, S Orzan, J Pang, J Van De Pol, MT Dashti, ... International Conference on Tools and Algorithms for the Construction and …, 2007 | 35 | 2007 |
Minimal message complexity of asynchronous multi-party contract signing S Mauw, S Radomirovic, MT Dashti 2009 22nd IEEE Computer Security Foundations Symposium, 13-25, 2009 | 29 | 2009 |
On the quest for impartiality: Design and analysis of a fair non-repudiation protocol J Cederquist, R Corin, MT Dashti Information and Communications Security: 7th International Conference, ICICS …, 2005 | 29 | 2005 |
Partial order reduction for branching security protocols W Fokkink, MT Dashti, A Wijs 2010 10th International Conference on Application of Concurrency to System …, 2010 | 28 | 2010 |
Decentralized composite access control P Tsankov, S Marinovic, MT Dashti, D Basin Principles of Security and Trust: Third International Conference, POST 2014 …, 2014 | 26 | 2014 |
Semi-valid input coverage for fuzz testing P Tsankov, MT Dashti, D Basin Proceedings of the 2013 International Symposium on Software Testing and …, 2013 | 22 | 2013 |
A privacy-friendly RFID protocol using reusable anonymous tickets M Asadpour, MT Dashti 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 22 | 2011 |
An intruder model for verifying liveness in security protocols J Cederquist, MT Dashti Proceedings of the fourth ACM workshop on Formal methods in security, 23-32, 2006 | 22 | 2006 |
Model-based detection of CSRF M Rocchetto, M Ochoa, M Torabi Dashti ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014 | 21 | 2014 |
Pruning state spaces with extended beam search M Torabi Dashti, AJ Wijs International Symposium on Automated Technology for Verification and …, 2007 | 19 | 2007 |
A certified email protocol using key chains J Cederquist, MT Dashti, S Mauw 21st International Conference on Advanced Information Networking and …, 2007 | 19 | 2007 |
LTL is closed under topological closure GP Maretić, MT Dashti, D Basin Information Processing Letters 114 (8), 408-413, 2014 | 18 | 2014 |
Scalable, privacy preserving radio‐frequency identification protocol for the internet of things M Asadpour, MT Dashti Concurrency and Computation: Practice and Experience 27 (8), 1932-1950, 2015 | 14 | 2015 |
Test execution checkpointing for web applications M Guarnieri, P Tsankov, T Buchs, M Torabi Dashti, D Basin Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017 | 13 | 2017 |
Access control synthesis for physical spaces P Tsankov, MT Dashti, D Basin 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 443-457, 2016 | 13 | 2016 |