关注
Iliano Cervesato
Iliano Cervesato
Professor of Computer Science, Carnegie Mellon University
在 cmu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A meta-notation for protocol analysis
I Cervesato, NA Durgin, PD Lincoln, JC Mitchell, A Scedrov
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 55-69, 1999
3791999
A linear logical framework
I Cervesato, F Pfenning
Information and computation 179 (1), 19-75, 2002
3012002
A concurrent logical framework I: Judgments and properties
K Watkins, I Cervesato, F Pfenning, D Walker
Technical Report CMU-CS-02-101, Department of Computer Science, Carnegie …, 2003
2312003
The logic of authentication protocols
P Syverson, I Cervesato
International school on foundations of security analysis and design, 63-137, 2000
2272000
The Dolev-Yao intruder is the most powerful attacker
I Cervesato
16th Annual Symposium on Logic in Computer Science—LICS 1, 1-2, 2001
1482001
On the detection of kernel-level rootkits using hardware performance counters
B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
1392017
Breaking and fixing public-key Kerberos
I Cervesato, AD Jaggard, A Scedrov, JK Tsay, C Walstad
Information and Computation 206 (2-4), 402-424, 2008
1252008
A concurrent logical framework: The propositional fragment
K Watkins, I Cervesato, F Pfenning, D Walker
International Workshop on Types for Proofs and Programs, 355-377, 2003
1202003
Relating strands and multiset rewriting for security protocol analysis
I Cervesato, N Durgin, J Mitchell, P Lincoln, A Scedrov
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 35-51, 2000
1162000
A concurrent logical framework II: Examples and applications
I Cervesato, F Pfenning, D Walker, K Watkins
Technical Report CMU-CS-02-102, Department of Computer Science, Carnegie …, 2002
1152002
A Linear Spine Calculus
I Cervesato, F Pfenning
112*1997
Efficient resource management for linear logic proof search
I Cervesato, JS Hodas, F Pfenning
Theoretical Computer Science 232 (1-2), 133-163, 2000
962000
A Formal Analysis of Some Properties of Kerberos 5 Using MSR.
F Butler, I Cervesato, AD Jaggard, A Scedrov
CSFW 2, 175-190, 2002
942002
Dolev-Yao is no better than Machiavelli
P Syverson, C Meadows, I Cervesato
First Workshop on Issues in the Theory of Security—WITS’00, 87-92, 2000
912000
Formal analysis of Kerberos 5
F Butler, I Cervesato, AD Jaggard, A Scedrov, C Walstad
Theoretical Computer Science 367 (1-2), 57-87, 2006
902006
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
M Backes, I Cervesato, AD Jaggard, A Scedrov, JK Tsay
Computer Science Department, 8, 2006
902006
Relating state-based and process-based concurrency through linear logic (full-version)
I Cervesato, A Scedrov
Information and Computation 207 (10), 1044-1077, 2009
892009
Efficient resource management for linear logic proof search
I Cervesato, JS Hodas, F Pfenning
Extensions of Logic Programming: 5th International Workshop, ELP'96 Leipzig …, 1996
741996
An encapsulated authentication logic for reasoning about key distribution protocols
I Cervesato, C Meadows, D Pavlovic
18th IEEE Computer Security Foundations Workshop (CSFW'05), 48-61, 2005
702005
Typed MSR: Syntax and examples
I Cervesato
International Workshop on Mathematical Methods, Models, and Architectures …, 2001
682001
系统目前无法执行此操作,请稍后再试。
文章 1–20