-
1
-
-
68249091950
-
Automatic verification of correspondences for security protocols
-
Blanchet, B.: Automatic verification of correspondences for security protocols. Journal of Computer Security 17(4), 363-434 (2009)
-
(2009)
Journal of Computer Security
, vol.17
, Issue.4
, pp. 363-434
-
-
Blanchet, B.1
-
2
-
-
48949088211
-
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols
-
Gupta, A., Malik, S. (eds.) CAV 2008 Springer, Heidelberg
-
Cremers, C.J.F.: The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols. In: Gupta, A., Malik, S. (eds.) CAV 2008. LNCS, vol. 5123, pp. 414-418. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5123
, pp. 414-418
-
-
Cremers, C.J.F.1
-
3
-
-
70349335930
-
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
-
Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009 Springer, Heidelberg
-
Mödersheim, S., Viganò, L.: The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009. LNCS, vol. 5705, pp. 166-194. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5705
, pp. 166-194
-
-
Mödersheim, S.1
Viganò, L.2
-
4
-
-
17744379731
-
A Calculus for Control Flow Analysis of Security Protocols
-
Buchholtz, M., Nielson, H.R., Nielson, F.: A Calculus for Control Flow Analysis of Security Protocols. International Journal of Information Security 2(3-4), 145-167 (2004)
-
(2004)
International Journal of Information Security
, vol.2
, Issue.3-4
, pp. 145-167
-
-
Buchholtz, M.1
Nielson, H.R.2
Nielson, F.3
-
5
-
-
70349314888
-
Maude-NPA:Cryptographic Protocol Analysis Modulo Equational Properties
-
Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009 Springer, Heidelberg
-
Escobar, S.,Meadows, C.,Meseguer, J.:Maude-NPA:Cryptographic Protocol Analysis Modulo Equational Properties. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) FOSAD 2007/2008/2009. LNCS, vol. 5705, pp. 1-50. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5705
, pp. 1-50
-
-
Escobar, S.1
Meadows, C.2
Meseguer, J.3
-
6
-
-
84555177840
-
A Survey of Cyber Physical Systems
-
IEEE
-
Shi, J., Wan, J., Yan, H., Suo, H.: A Survey of Cyber Physical Systems. In:Wireless Communications and Signal Processing (WSCP 2011), pp. 1-6. IEEE (2011)
-
(2011)
Wireless Communications and Signal Processing (WSCP 2011)
, pp. 1-6
-
-
Shi, J.1
Wan, J.2
Yan, H.3
Suo, H.4
-
7
-
-
84868144325
-
The Cyber-Physical Attacker
-
Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012 Workshops Springer, Heidelberg
-
Vigo, R.: The Cyber-Physical Attacker. In: Ortmeier, F., Daniel, P. (eds.) SAFECOMP 2012 Workshops. LNCS, vol. 7613, pp. 347-356. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7613
, pp. 347-356
-
-
Vigo, R.1
-
9
-
-
77951729734
-
A Survey of Game Theory as Applied to Network Security
-
IEEE
-
Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A Survey of Game Theory as Applied to Network Security. In: 43rd Hawaii Int. Conf. on System Sciences (HICSS 2010), pp. 1-10. IEEE (2010)
-
(2010)
43rd Hawaii Int. Conf. on System Sciences (HICSS 2010)
, pp. 1-10
-
-
Roy, S.1
Ellis, C.2
Shiva, S.3
Dasgupta, D.4
Shandilya, V.5
Wu, Q.6
-
11
-
-
79960617357
-
A game theoretic study of attack and defense in cyber-physical systems
-
IEEE
-
Ma, C.Y.T., Rao, N.S.V., Yau, D.K.Y.: A game theoretic study of attack and defense in cyber-physical systems. In: 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 708-713. IEEE (2011)
-
(2011)
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
, pp. 708-713
-
-
Ma, C.Y.T.1
Rao, N.S.V.2
Yau, D.K.Y.3
-
12
-
-
84859902392
-
Cloud computing infrastructure robustness: A game theory approach
-
Rao, N., Poole, S., He, F., Zhuang, J., Ma, C.T., Yau, D.: Cloud computing infrastructure robustness: A game theory approach. In: 2012 International Conference on Computing, Networking and Communications (ICNC), pp. 34-38 (2012)
-
(2012)
2012 International Conference on Computing, Networking and Communications (ICNC)
, pp. 34-38
-
-
Rao, N.1
Poole, S.2
He, F.3
Zhuang, J.4
Ma, C.T.5
Yau, D.6
-
13
-
-
84874429428
-
PRISM-games: A model checker for stochastic multi-player games
-
Piterman, N., Smolka, S.A. (eds.) TACAS 2013 (ETAPS 2013) Springer, Heidelberg
-
Chen, T., Forejt, V., Kwiatkowska, M., Parker, D., Simaitis, A.: PRISM-games: A model checker for stochastic multi-player games. In: Piterman, N., Smolka, S.A. (eds.) TACAS 2013 (ETAPS 2013). LNCS, vol. 7795, pp. 185-191. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7795
, pp. 185-191
-
-
Chen, T.1
Forejt, V.2
Kwiatkowska, M.3
Parker, D.4
Simaitis, A.5
-
14
-
-
84899426629
-
Multi-Objective Optimization for Security Games
-
Brown, M., An, B., Kiekintveld, C., Ordóñez, F., Tambe, M.: Multi-Objective Optimization for Security Games. In: 11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012), pp. 863-870 (2012)
-
(2012)
11th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2012)
, pp. 863-870
-
-
Brown, M.1
An, B.2
Kiekintveld, C.3
Ordóñez, F.4
Tambe, M.5
-
15
-
-
38049144769
-
Strategic games on defense trees
-
Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006 Springer, Heidelberg
-
Bistarelli, S., Dall'Aglio, M., Peretti, P.: Strategic games on defense trees. In: Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (eds.) FAST 2006. LNCS, vol. 4691, pp. 1-15. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4691
, pp. 1-15
-
-
Bistarelli, S.1
Dall'Aglio, M.2
Peretti, P.3
-
16
-
-
0037937457
-
A game-based verification of non-repudiation and fair exchange protocols
-
Kremer, S., Raskin, J.F.: A game-based verification of non-repudiation and fair exchange protocols. Journal of Computer Security 11(3), 551-565 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 551-565
-
-
Kremer, S.1
Raskin, J.F.2
-
17
-
-
84890871230
-
A game-theoretic framework for specification and verification of cryptographic protocols
-
Saleh, M., Debbabi, M.: A game-theoretic framework for specification and verification of cryptographic protocols. Formal Aspects of Computing 22(5), 585-609 (2010)
-
(2010)
Formal Aspects of Computing
, vol.22
, Issue.5
, pp. 585-609
-
-
Saleh, M.1
Debbabi, M.2
-
18
-
-
0026820657
-
The Complexity of Stochastic Games
-
Condon, A.: The Complexity of Stochastic Games. Information and Computation 96, 203-224 (1992)
-
(1992)
Information and Computation
, vol.96
, pp. 203-224
-
-
Condon, A.1
-
19
-
-
33745617997
-
Simple Stochastic Parity Games
-
Baaz, M., Makowsky, J.A. (eds.) CSL 2003 Springer, Heidelberg
-
Chatterjee, K., Jurdziński, M., Henzinger, T.A.: Simple Stochastic Parity Games. In: Baaz, M., Makowsky, J.A. (eds.) CSL 2003. LNCS, vol. 2803, pp. 100-113. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2803
, pp. 100-113
-
-
Chatterjee, K.1
Jurdziński, M.2
Henzinger, T.A.3
-
20
-
-
75649084931
-
The Complexity of Solving Stochastic Games on Graphs
-
Dong, Y., Du, D.-Z., Ibarra, O. (eds.) ISAAC 2009 Springer, Heidelberg
-
Andersson, D., Miltersen, P.B.: The Complexity of Solving Stochastic Games on Graphs. In: Dong, Y., Du, D.-Z., Ibarra, O. (eds.) ISAAC 2009. LNCS, vol. 5878, pp. 112-121. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5878
, pp. 112-121
-
-
Andersson, D.1
Miltersen, P.B.2
-
24
-
-
26444468097
-
Recursive Markov Decision Processes and Recursive Stochastic Games
-
Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005 Springer, Heidelberg
-
Etessami, K., Yannakakis, M.: Recursive Markov Decision Processes and Recursive Stochastic Games. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 891-903. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 891-903
-
-
Etessami, K.1
Yannakakis, M.2
|