Follow
Tajana Ban Kirigin
Title
Cited by
Cited by
Year
Bounded memory Dolev-Yao adversaries in collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Information and computation, Special issue on Security and Rewriting …, 2014
262014
Time, computational complexity, and probability in the analysis of distance-bounding protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Journal of Computer Security 25 (6), 585-630, 2017
252017
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
4th Conference on Principles of Security and Trust (POST), Springer LNCS …, 2015
242015
A rewriting framework and logic for activities subject to regulations
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott, R Perovic
Mathematical Structures in Computer Science, 2015
212015
A Rewriting Framework for Activities Subject to Regulations.
MI Kanovich, T Ban Kirigin, V Nigam, A Scedrov, CL Talcott, R Perovic
RTA 15, 305-322, 2012
212012
Resource-bounded intruders in denial of service attacks
AA Urquiza, MA AlTurki, M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, ...
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 382-38214, 2019
202019
Timed multiset rewriting and the verification of time-sensitive distributed systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
International Conference on Formal Modeling and Analysis of Timed Systems …, 2016
192016
Bounded memory protocols and progressing collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Computer Security–ESORICS 2013, Springer LNCS 8134, 309-326, 2013
152013
Lexical sense labeling and sentiment potential analysis using corpus-based dependency graph
T Ban Kirigin, S Bujačić Babić, B Perak
Mathematics 9 (12), 1449, 2021
122021
Statistical model checking of distance fraud attacks on the Hancke-Kuhn family of protocols
MA Alturki, M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Proceedings of the 2018 workshop on cyber-physical systems security and …, 2018
122018
Towards Timed Models for Cyber-Physical Security Protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Joint Workshop on Foundations of Computer Security and Formal and …, 2014
122014
Bounded memory Dolev-Yao adversaries in collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Formal Aspects of Security and Trust, 18-33, 2011
112011
On the Complexity of Verification of Time-Sensitive Distributed Systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Protocols, Strands, and Logic, 251-275, 2021
102021
Resource and timing aspects of security protocols
A Aires Urquiza, MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, ...
Journal of computer security 29 (3), 299-340, 2021
102021
A multiset rewriting model for specifying and verifying timing aspects of security protocols
MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, A Scedrov, C Talcott
Foundations of Security, Protocols, and Equational Reasoning, 192-213, 2019
102019
Semi-Local Integration Measure of Node Importance
T Ban Kirigin, S Bujačić Babić, B Perak
Mathematics 10 (3), 1-16, 2022
92022
Progressing collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Advances in computer science: an international journal 3 (3), 78-86, 2014
9*2014
Towards an automated assistant for clinical investigations
V Nigam, T Ban Kirigin, A Scedrov, C Talcott, M Kanovich, R Perovic
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
92012
Progressing collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Workshop on Foundations of Security and Privacy (FCS-PrivMod 2010), 2010
92010
On the formalization and computational complexity of resilience problems for cyber-physical systems
MA Alturki, T Ban Kirigin, M Kanovich, V Nigam, A Scedrov, C Talcott
International Colloquium on Theoretical Aspects of Computing, 96-113, 2022
82022
The system can't perform the operation now. Try again later.
Articles 1–20