Journal Article Formal analysis of Kerberos 5 2006 • Theoretical Computer Science • 367(1-2):57-87 Butler F, Cervesato I, Jaggard AD, Scedrov A, Walstad C
Journal Article Relating State-Based and Process-Based Concurrency through Linear Logic 2006 • Electronic Notes in Theoretical Computer Science • 165:145-176 Cervesato I, Scedrov A
Journal Article Towards a Notion of Quantitative Security Analysis 2006 • Advances in Information Security • 23:131-143 Cervesato I
Journal Article A comparison between strand spaces and multiset rewriting for security protocol analysis 2005 • Journal of Computer Security • 13(2):265-316 Cervesato I, Durgin NA, Lincoln PD, Mitchell JC, Scedrov A
Conference An encapsulated authentication logic for reasoning about key distribution protocols 2005 • Proceedings of the Computer Security Foundations Workshop • 48-61 Cervesato I, Meadows C, Pavlovic D
Journal Article Preface to the special issue of selected papers from FCS/VERIFY 2002 2005 • International Journal of Information Security • 4(1-2):1-1 Autexier S, Cervesato I, Mantel H
Conference Relating multiset rewriting and process algebras for security protocol analysis 2005 • Journal of Computer Security • 13(1):3-47 Bistarelli S, Cervesato I, Lenzini G, Martinelli F
Conference Representing the MSR Cryptoprotocol Specification Language in an Extension of Rewriting Logic with Dependent Types 2005 • Electronic Notes in Theoretical Computer Science • 117:183-207 Cervesato I, Stehr M-O
Conference Specifying Kerberos 5 cross-realm authentication 2005 12-26 Cervesato I, Jaggard AD, Scedrov A, Walstad C
Journal Article A concurrent logical framework: The propositional fragment 2004 • Annals of the New York Academy of Sciences • 3085:355-377 Watkins K, Cervesato I, Pfenning F, Walker D
Journal Article Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer 2004 • Journal of Computer Security • 12(6):893-931 Meadows C, Syverson P, Cervesato I
Journal Article On representing biological systems through multiset rewriting 2004 • Lecture Notes in Computer Science • 2809:415-426 Bistarelli S, Cervesato I, Lenzini G, Marangoni R, Martinelli F
Journal Article Verifying confidentiality and authentication in Kerberos 5 2004 • Lecture Notes in Computer Science • 3233:1-24 Butler F, Cervesato I, Jaggard AD, Scedrov A
Journal Article A comparison between strand spaces and multiset rewriting for security protocol analysis 2003 • Lecture Notes in Computer Science • 2609:356-383 Cervesato I, Durgin N, Lincoln P, Mitchel J, Scedrov A
Journal Article A Concurrent Logical Framework I: Judgments and Properties 2003 Watkins K, Cervesato I, Pfenning F, Walker D
Journal Article A Current Logical Framework: The Propositional Fragment 2003 Watkins K, Cervesato I, Pfenning F, Walker D
Journal Article A linear spine calculus 2003 • Journal of Logic and Computation • 13(5):639-688 Cervesato I, Pfenning F
Journal Article Data access specification and the most powerful symbolic attacker in <i>MSR</i> 2003 • Lecture Notes in Computer Science • 2609:384-416 Cervesato I
Journal Article On representing biological systems through multiset rewriting 2003 • Lecture Notes in Computer Science • 2809:415-426 Bistarelli S, Cervesato I, Lenzini G, Marangoni R, Martinelli F
Journal Article Relating process algebras and multiset rewriting for immediate decryption protocols 2003 • Lecture Notes in Computer Science • 2776:86-99 Bistarelli S, Cervesato I, Lenzini G, Martinelli F
Conference A Formal Analysis of Some Properties of Kerberos 5 using MSR 2002 • Proceedings of the Computer Security Foundations Workshop • 1-16 Butler F, Cervesato I, Jaggard AD, Scedrov A
Journal Article A linear logical framework 2002 • Information and Computation • 179(1):19-75 Cervesato I, Pfenning F
Conference Formalizing GDOI group key management requirements in NPATRL 2001 • Proceedings of the ACM Conference on Computer and Communications Security • 235-244 Meadows C, Syverson P, Cervesato I
Conference Proceedings of the Computer Security Foundations Workshop: Preface 2001 • Proceedings of the Computer Security Foundations Workshop Cervesato I