Suivre
Mohammad Torabi Dashti
Mohammad Torabi Dashti
ETH Zurich
Adresse e-mail validée de duck.com
Titre
Citée par
Citée par
Année
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
1442012
SECFUZZ: Fuzz-testing security protocols
P Tsankov, MT Dashti, D Basin
2012 7th International Workshop on Automation of Software Test (AST), 1-7, 2012
1092012
A hybrid PKI-IBC based ephemerizer system
SK Nair, MT Dashti, B Crispo, AS Tanenbaum
New Approaches for Security, Privacy and Trust in Complex Environments …, 2007
552007
A Framework for Automatically Checking Anonymity with μCRL
T Chothia, S Orzan, J Pang, M Torabi Dashti
Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007
492007
Vera: A flexible model-based vulnerability testing tool
A Blome, M Ochoa, K Li, M Peroli, MT Dashti
2013 IEEE Sixth International Conference on Software Testing, Verification …, 2013
352013
Distributed Analysis with μCRL: A Compendium of Case Studies
S Blom, JR Calamé, B Lisser, S Orzan, J Pang, J Van De Pol, MT Dashti, ...
International Conference on Tools and Algorithms for the Construction and …, 2007
352007
Minimal message complexity of asynchronous multi-party contract signing
S Mauw, S Radomirovic, MT Dashti
2009 22nd IEEE Computer Security Foundations Symposium, 13-25, 2009
292009
On the quest for impartiality: Design and analysis of a fair non-repudiation protocol
J Cederquist, R Corin, MT Dashti
Information and Communications Security: 7th International Conference, ICICS …, 2005
292005
Partial order reduction for branching security protocols
W Fokkink, MT Dashti, A Wijs
2010 10th International Conference on Application of Concurrency to System …, 2010
282010
Decentralized composite access control
P Tsankov, S Marinovic, MT Dashti, D Basin
Principles of Security and Trust: Third International Conference, POST 2014 …, 2014
262014
Semi-valid input coverage for fuzz testing
P Tsankov, MT Dashti, D Basin
Proceedings of the 2013 International Symposium on Software Testing and …, 2013
222013
A privacy-friendly RFID protocol using reusable anonymous tickets
M Asadpour, MT Dashti
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
222011
An intruder model for verifying liveness in security protocols
J Cederquist, MT Dashti
Proceedings of the fourth ACM workshop on Formal methods in security, 23-32, 2006
222006
Model-based detection of CSRF
M Rocchetto, M Ochoa, M Torabi Dashti
ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International …, 2014
212014
Pruning state spaces with extended beam search
M Torabi Dashti, AJ Wijs
International Symposium on Automated Technology for Verification and …, 2007
192007
A certified email protocol using key chains
J Cederquist, MT Dashti, S Mauw
21st International Conference on Advanced Information Networking and …, 2007
192007
LTL is closed under topological closure
GP Maretić, MT Dashti, D Basin
Information Processing Letters 114 (8), 408-413, 2014
182014
Scalable, privacy preserving radio‐frequency identification protocol for the internet of things
M Asadpour, MT Dashti
Concurrency and Computation: Practice and Experience 27 (8), 1932-1950, 2015
142015
Test execution checkpointing for web applications
M Guarnieri, P Tsankov, T Buchs, M Torabi Dashti, D Basin
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
132017
Access control synthesis for physical spaces
P Tsankov, MT Dashti, D Basin
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 443-457, 2016
132016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20