Journal Article Formal analysis of Kerberos 5 2006 • Theoretical Computer Science • 367(1-2):57-87 Butler F, Cervesato I, Jaggard AD, Scedrov A, Walstad C
Journal Article Relating State-Based and Process-Based Concurrency through Linear Logic 2006 • Electronic Notes in Theoretical Computer Science • 165:145-176 Cervesato I, Scedrov A
Journal Article Towards a notion of quantitative security analysis 2006 • Advances in Information Security • 23:131-143 Cervesato I
Journal Article A comparison between strand spaces and multiset rewriting for security protocol analysis 2005 • Journal of Computer Security • 13(2):265-316 Cervesato I, Durgin NA, Lincoln PD, Mitchell JC, Scedrov A
Conference An encapsulated authentication logic for reasoning about key distribution protocols 2005 • Proceedings of the Computer Security Foundations Workshop • 48-61 Cervesato I, Meadows C, Pavlovic D
Journal Article Preface to the special issue of selected papers from FCS/VERIFY 2002 2005 • International Journal of Information Security • 4(1-2):1 Autexier S, Cervesato I, Mantel H
Conference Relating multiset rewriting and process algebras for security protocol analysis 2005 • Journal of Computer Security • 13(1):3-47 Bistarelli S, Cervesato I, Lenzini G, Martinelli F
Conference Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types 2005 • Electronic Notes in Theoretical Computer Science • 117(SPEC. ISS.):183-207 Cervesato I, Stehr MO
Conference Specifying Kerberos 5 cross-realm authentication 2005 • Proceedings of the 2005 Workshop on Issues in the Theory of Security, WITS '05 • 12-26 Cervesato I, Jaggard AD, Scedrov A, Walstad C
Journal Article A concurrent logical framework: The propositional fragment 2004 • Annals of the New York Academy of Sciences • 3085:355-377 Watkins K, Cervesato I, Pfenning F, Walker D
Journal Article Formal specification and analysis of the Group Domain of Interpretation Protocol using NPATRL and the NRL protocol analyzer 2004 • Journal of Computer Security • 12(6):893-931 Meadows C, Syverson P, Cervesato I
Journal Article On representing biological systems through multiset rewriting 2004 • Lecture Notes in Computer Science • 2809:415-426 Bistarelli S, Cervesato I, Lenzini G, Marangoni R, Martinelli F
Journal Article Verifying confidentiality and authentication in Kerberos 5 2004 • Lecture Notes in Computer Science • 3233:1-24 Butler F, Cervesato I, Jaggard AD, Scedrov A
Journal Article A comparison between strand spaces and multiset rewriting for security protocol analysis 2003 • Lecture Notes in Computer Science • 2609:356-383 Cervesato I, Durgin N, Lincoln P, Mitchel J, Scedrov A
Journal Article A Concurrent Logical Framework I: Judgments and Properties 2003 Watkins K, Cervesato I, Pfenning F, Walker D
Journal Article A Current Logical Framework: The Propositional Fragment 2003 Watkins K, Cervesato I, Pfenning F, Walker D
Journal Article A linear spine calculus 2003 • Journal of Logic and Computation • 13(5):639-688 Cervesato I, Pfenning F
Journal Article Data access specification and the most powerful symbolic attacker in <i>MSR</i> 2003 • Lecture Notes in Computer Science • 2609:384-416 Cervesato I
Journal Article On representing biological systems through multiset rewriting 2003 • Lecture Notes in Computer Science • 2809:415-426 Bistarelli S, Cervesato I, Lenzini G, Marangoni R, Martinelli F
Journal Article Relating process algebras and multiset rewriting for immediate decryption protocols 2003 • Lecture Notes in Computer Science • 2776:86-99 Bistarelli S, Cervesato I, Lenzini G, Martinelli F
Conference A formal analysis of ome properties of kerberos 5 using MSR 2002 • Proceedings of the Computer Security Foundations Workshop • 2002-January:175-190 Butler F, Cervesato I, Jaggard AD, Scedrov A
Journal Article A linear logical framework 2002 • Information and Computation • 179(1):19-75 Cervesato I, Pfenning F
Conference Formalizing GDOI group key management requirements in NPATRL 2001 • Proceedings of the ACM Conference on Computer and Communications Security • 235-244 Meadows C, Syverson P, Cervesato I
Conference Proceedings of the Computer Security Foundations Workshop: Preface 2001 • Proceedings of the Computer Security Foundations Workshop Cervesato I