Cas Cremers
Cas Cremers
Professor of Computer Science, CISPA Helmholtz Center for Information Security, Saarland University
Bestätigte E-Mail-Adresse bei cispa.de - Startseite
Titel
Zitiert von
Zitiert von
Jahr
The Scyther Tool: Verification, falsification, and analysis of security protocols
CJF Cremers
International conference on computer aided verification, 414-418, 2008
5652008
The Tamarin prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification, 696-701, 2013
3712013
Scyther: Semantics and verification of security protocols
CJF Cremers
Dissertation Abstracts International 68 (02), 2006
2372006
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
2162012
Handbook of model checking
EM Clarke, TA Henzinger, H Veith, R Bloem, PA Abdulla, R Alur, C Baier, ...
Springer, 2018
2052018
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33 (4), 1914-1983, 2020
1982020
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE Symposium on Security and Privacy, 113-127, 2012
1742012
Security properties
C Cremers, S Mauw
Operational Semantics and Verification of Security Protocols, 37-65, 2012
1292012
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
128*2014
Provably repairing the ISO/IEC 9798 standard for entity authentication
D Basin, C Cremers, S Meier
Journal of Computer Security 21 (6), 817-846, 2013
1012013
A comprehensive symbolic analysis of TLS 1.3
C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
942017
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
CJF Cremers
Proceedings of the 15th ACM conference on Computer and communications …, 2008
942008
On post-compromise security
K Cohn-Gordon, C Cremers, L Garratt
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 164-178, 2016
922016
A framework for compositional verification of security protocols
S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović
Information and Computation 206 (2-4), 425-459, 2008
91*2008
Comparing state spaces in automatic security protocol analysis
CJF Cremers, P Lafourcade, P Nadeau
Formal to Practical Security, 70-94, 2009
902009
Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2
C Cremers
European Symposium on Research in Computer Security, 315-334, 2011
852011
Model checking security protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
822018
Operational semantics of security protocols
C Cremers, S Mauw
Scenarios: Models, Transformations and Tools, 66-89, 2005
792005
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
782020
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol
CJF Cremers
International Conference on Applied Cryptography and Network Security, 20-33, 2009
752009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20