Protocol composition logic (PCL) A Datta, A Derek, JC Mitchell, A Roy Electronic Notes in Theoretical Computer Science 172, 311-358, 2007 | 297 | 2007 |
A derivation system and compositional logic for security protocols A Datta, A Derek, JC Mitchell, D Pavlovic Journal of Computer Security 13 (3), 423-482, 2005 | 206 | 2005 |
A modular correctness proof of IEEE 802.11 i and TLS C He, M Sundararajan, A Datta, A Derek, JC Mitchell Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 189 | 2005 |
Probabilistic polynomial-time semantics for a protocol security logic A Datta, A Derek, JC Mitchell, V Shmatikov, M Turuani International Colloquium on Automata, Languages, and Programming, 16-29, 2005 | 142 | 2005 |
A derivation system for security protocols and its logical formalization A Datta, A Derek, JC Mitchell, D Pavlovic Computer Security Foundations Workshop, 2003. Proceedings. 16th IEEE, 109-125, 2003 | 110 | 2003 |
Computationally sound compositional logic for key exchange protocols A Datta, A Derek, JC Mitchell, B Warinschi Computer Security Foundations Workshop, 2006. 19th IEEE, 14 pp.-334, 2006 | 109* | 2006 |
Secure protocol composition A Datta, A Derek, JC Mitchell, D Pavlovic Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003 | 108 | 2003 |
Compositional analysis of contract-signing protocols M Backes, A Datta, A Derek, JC Mitchell, M Turuani Theoretical Computer Science 367 (1-2), 33-56, 2006 | 65 | 2006 |
Games and the impossibility of realizable ideal functionality A Datta, A Derek, J Mitchell, A Ramanathan, A Scedrov Theory of Cryptography, 360-379, 2006 | 57* | 2006 |
Abstraction and refinement in protocol derivation A Datta, A Derek, JC Mitchell, D Pavlovic Computer Security Foundations Workshop, 2004. Proceedings. 17th IEEE, 30-45, 2004 | 54 | 2004 |
Secrecy analysis in protocol composition logic A Roy, A Datta, A Derek, JC Mitchell, JP Seifert Annual Asian Computing Science Conference, 197-213, 2006 | 49 | 2006 |
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens I Sluganovic, M Serbec, A Derek, I Martinovic Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 44 | 2017 |
Inductive proofs of computational secrecy A Roy, A Datta, A Derek, J Mitchell Computer Security–ESORICS 2007, 219-234, 2007 | 29 | 2007 |
Secrecy analysis in protocol composition logic PC Logic Formal Logical Methods for System Security and Correctness 14, 199, 2008 | 20 | 2008 |
Inductive trace properties for computational security A Roy, A Datta, A Derek, JC Mitchell Journal of Computer Security 18 (6), 1035-1073, 2010 | 11 | 2010 |
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets I Sluganovic, M Liskij, A Derek, I Martinovic Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 8 | 2020 |
Formal analysis of security protocols: protocol composition logic A Derek Stanford University, 2007 | 8 | 2007 |
Flexible Remote Attestation of Pre-SNP SEV VMs Using SGX Enclaves P Antonino, A Derek, WA Woloszyn IEEE Access 11, 2023 | 7 | 2023 |
C3PO: cipher construction with cartesian genetic programming S Picek, K Knezevic, D Jakobovic, A Derek Proceedings of the Genetic and Evolutionary Computation Conference Companion …, 2019 | 7 | 2019 |
Automatically generating models of IT systems I Kovačević, S Groš, A Derek IEEE Access, 2022 | 4 | 2022 |