Volgen
Cas Cremers
Cas Cremers
Professor of Computer Science, CISPA Helmholtz Center for Information Security
Geverifieerd e-mailadres voor cispa.de - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols: Tool Paper
CJF Cremers
Computer Aided Verification: 20th International Conference, CAV 2008 …, 2008
7922008
The Tamarin prover for the symbolic analysis of security protocols
S Meier, B Schmidt, C Cremers, D Basin
Computer Aided Verification, 696-701, 2013
6692013
Handbook of model checking
EM Clarke, TA Henzinger, H Veith, R Bloem, PA Abdulla, R Alur, C Baier, ...
Springer, 2018
5512018
A formal security analysis of the signal messaging protocol
K Cohn-Gordon, C Cremers, B Dowling, L Garratt, D Stebila
Journal of Cryptology 33, 1914-1983, 2020
3742020
Scyther: Semantics and verification of security protocols
CJF Cremers
Dissertation Abstracts International 68 (02), 2006
3222006
Automated analysis of Diffie-Hellman protocols and advanced security properties
B Schmidt, S Meier, C Cremers, D Basin
2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012
2992012
Decentralized privacy-preserving proximity tracing
C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ...
arXiv preprint arXiv:2005.12273, 2020
2942020
A comprehensive symbolic analysis of TLS 1.3
C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2272017
Distance hijacking attacks on distance bounding protocols
C Cremers, KB Rasmussen, B Schmidt, S Capkun
2012 IEEE symposium on security and privacy, 113-127, 2012
2022012
Security properties
C Cremers, S Mauw, C Cremers, S Mauw
Operational Semantics and Verification of Security Protocols, 37-65, 2012
191*2012
On post-compromise security
K Cohn-Gordon, C Cremers, L Garratt
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 164-178, 2016
1782016
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
169*2014
On ends-to-ends encryption: Asynchronous group messaging with strong security guarantees
K Cohn-Gordon, C Cremers, L Garratt, J Millican, K Milner
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1352018
Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication
C Cremers, M Horvat, S Scott, T van der Merwe
2016 IEEE Symposium on Security and Privacy (SP), 470-485, 2016
1262016
Model checking security protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
1222018
Provably repairing the ISO/IEC 9798 standard for entity authentication
D Basin, C Cremers, S Meier
Journal of Computer Security 21 (6), 817-846, 2013
1172013
SoK: Computer-aided cryptography
M Barbosa, G Barthe, K Bhargavan, B Blanchet, C Cremers, K Liao, ...
2021 IEEE symposium on security and privacy (SP), 777-795, 2021
1082021
Key exchange in IPsec revisited: Formal analysis of IKEv1 and IKEv2
C Cremers
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
1062011
Comparing state spaces in automatic security protocol analysis
CJF Cremers, P Lafourcade, P Nadeau
Formal to Practical Security: Papers Issued from the 2005-2008 French …, 2009
1042009
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
CJF Cremers
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1002008
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20