Luca Vigan˛
Luca Vigan˛
Professor of Computer Science and Head of the Cybersecurity Group, Department of Informatics, King's
Verified email at kcl.ac.uk - Homepage
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J CuÚllar, ...
International conference on computer aided verification, 281-285, 2005
10612005
OFMC: A symbolic model checker for security protocols
D Basin, S M÷dersheim, L Vigano
International Journal of Information Security 4 (3), 181-208, 2005
5292005
Automated security protocol analysis with the AVISPA tool
L Vigan˛
Electronic Notes in Theoretical Computer Science 155, 61-86, 2006
2902006
An on-the-fly model-checker for security protocol analysis
D Basin, S M÷dersheim, L Vigano
European Symposium on Research in Computer Security, 253-270, 2003
2222003
Labelled non-classical logics
L Vigano
Springer Science & Business Media, 2013
1862013
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction andá…, 2012
1182012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
972002
Labelled propositional modal logics: Theory and practice
D Basin, S Matthews, L Vigano
Journal of Logic and Computation 7 (6), 685-717, 1997
901997
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
M Backes, S M÷dersheim, B Pfitzmann, L Vigano
International Conference on Foundations of Software Science and Computationá…, 2006
832006
Secure pseudonymous channels
S M÷dersheim, L Vigan˛
European Symposium on Research in Computer Security, 337-354, 2009
792009
Natural deduction for non-classical logics
D Basin, S Matthews, L Vigano
Studia Logica 60 (1), 119-160, 1998
731998
The open-source fixed-point model checker for symbolic analysis of security protocols
S M÷dersheim, L Vigan˛
Foundations of Security Analysis and Design V, 166-194, 2009
682009
Labelled deduction
D Basin, M D'Agostino, DM Gabbay, S Matthews, L Vigan˛
Springer Science & Business Media, 2012
532012
CDiff: a new reduction technique for constraint-based analysis of security protocols
D Basin, S M÷dersheim, L Vigano
Proceedings of the 10th ACM conference on Computer and communicationsá…, 2003
522003
On the semantics of Alice&Bob specifications of security protocols
C Caleiro, L Vigan˛, D Basin
Theoretical Computer Science 367 (1-2), 88-122, 2006
462006
Labelled modal logics: Quantifiers
D Basin, S Matthews, L Vigano
Journal of Logic, Language and Information 7 (3), 237-263, 1998
401998
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
S M÷dersheim, L Vigano, D Basin
Journal of Computer Security 18 (4), 575-618, 2010
392010
Fibring labelled deduction systems
J Rasga, A Sernadas, C Sernadas, L Vigano
Journal of Logic and Computation 12 (3), 443-473, 2002
392002
A formal approach to cyber-physical attacks
R Lanotte, M Merro, R Muradore, L Vigan˛
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 436-450, 2017
372017
Algebraic intruder deductions
D Basin, S M÷dersheim, L Vigano
International Conference on Logic for Programming Artificial Intelligenceá…, 2005
372005
The system can't perform the operation now. Try again later.
Articles 1–20