Filter
Conference contribution

Search results

  • 2020

    Account and Transaction Protocol of the Open Banking Standard

    Almehrej, A., Freitas, L. & Modesti, P., 22 May 2020, Rigorous State-Based Methods, 7th International Conference, ABZ 2020. Raschke, A., Méry, D. & Houdek, F. (eds.). Springer International Publishing AG, Vol. 12071. 7 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    123 Downloads (Pure)
  • 2018

    A Methodology for Protocol Verification Applied to EMV 1

    Freitas, L., Modesti, P. & Emms, M., 2018, Formal Methods: Foundations and Applications - 21st Brazilian Symposium, SBMF 2018, Proceedings. Massoni, T. & Mousavi, M. R. (eds.). Springer, Vol. 11254. p. 180-197 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11254 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    161 Downloads (Pure)
  • 2017

    An IDE for the Design, Verification and Implementation of Security Protocols

    Garcia, R. & Modesti, P., 16 Nov 2017, IEEE International Symposium on Software Reliability Engineering Workshops, ISSRE Workshops, Toulouse, France, October 23-26, 2017. IEEE Computer Society, p. 157-163 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    152 Downloads (Pure)
  • 2016

    AnBx: Automatic Generation and Verification of Security Protocols Implementations

    Modesti, P., 25 Feb 2016, (E-pub ahead of print) Foundations and Practice of Security . García-Alfaro, J., Kranakis, E. & Bonfante, G. (eds.). Springer, Vol. 9482. p. 156-173 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    238 Downloads (Pure)
  • 2015

    Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment

    Almousa, O., Mödersheim, S., Modesti, P. & Viganò, L., 2015, Proceedings, Part II, Computer Security - ESORICS 2015. Pernul, G., Ryan, P. Y. A. & Weippl, E. R. (eds.). Springer, Vol. 9327. p. 209-229 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    161 Downloads (Pure)
  • 2014

    Efficient Java Code Generation of Security Protocols Specified in AnB/AnBx

    Modesti, P., 2014, Proceedings, Security and Trust Management. Mauw, S. & Jensen, C. D. (eds.). Springer, Vol. 8743. p. 204-208 5 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
    139 Downloads (Pure)
  • 2011

    Verifying SeVeCom using set-based abstraction

    Mödersheim, S. & Modesti, P., 12 Aug 2011, IEEE International Wireless Communications and Mobile Computing Conference, IWCMC 2011, Istanbul, Turkey, 4-8 July, 2011. IEEE, p. 1164-1169 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
    157 Downloads (Pure)
  • 2010

    AnBx - Security Protocols Design and Verification

    Bugliesi, M. & Modesti, P., 2010, Revised Selected Papers, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010: Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop. Armando, A. & Lowe, G. (eds.). Springer, Vol. 6186. p. 164-184 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    File
    107 Downloads (Pure)