Seguir
David Basin
David Basin
Professor of Computer Science, ETH Zurich
Dirección de correo verificada de inf.ethz.ch - Página principal
Título
Citado por
Citado por
Año
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
15942005
SecureUML: A UML-based modeling language for model-driven security
T Lodderstedt, D Basin, J Doser
International Conference on the Unified Modeling Language, 426-441, 2002
11792002
The TAMARIN prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
8242013
Handbook of model checking
Springer 10, 978-3, 2018
742*2018
Model driven security: From UML models to access control infrastructures
D Basin, J Doser, T Lodderstedt
ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (1), 39-91, 2006
7212006
OFMC: A symbolic model checker for security protocols
D Basin, S Mödersheim, L Vigano
International Journal of Information Security 4, 181-208, 2005
6682005
An information-theoretic model for adaptive side-channel attacks
B Köpf, D Basin
Proceedings of the 14th ACM conference on Computer and communications …, 2007
4632007
A formal analysis of 5G authentication
D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
4332018
Distributed usage control
A Pretschner, M Hilty, D Basin
Communications of the ACM 49 (9), 39-44, 2006
3442006
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
3422020
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
3232012
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
Computer Security–ESORICS 2003: 8th European Symposium on Research in …, 2003
2602003
A policy language for distributed usage control
M Hilty, A Pretschner, D Basin, C Schaefer, T Walter
Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007
2362007
Rippling: meta-level guidance for mathematical reasoning
A Bundy, D Basin, D Hutter, A Ireland
Cambridge Univ Press, 2005
2172005
Monitoring metric first-order temporal properties
D Basin, F Klaedtke, S Müller, E Zălinescu
Journal of the ACM (JACM) 62 (2), 1-45, 2015
2122015
Sok: Secure data deletion
J Reardon, D Basin, S Capkun
2013 IEEE symposium on security and privacy, 301-315, 2013
2052013
Model driven security for process-oriented systems
D Basin, J Doser, T Lodderstedt
Proceedings of the eighth ACM symposium on Access control models and …, 2003
2022003
On obligations
M Hilty, D Basin, A Pretschner
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
1812005
Automated analysis of security-design models
D Basin, M Clavel, J Doser, M Egea
Information and Software Technology 51 (5), 815-831, 2009
1722009
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1712014
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20