Takip et
Graham Steel
Graham Steel
INRIA
cryptosense.com üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Efficient padding oracle attacks on cryptographic hardware
R Bardou, R Focardi, Y Kawamoto, L Simionato, G Steel, JK Tsay
Annual Cryptology Conference, 608-625, 2012
1502012
Attacking and fixing PKCS# 11 security tokens
M Bortolozzo, M Centenaro, R Focardi, G Steel
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1372010
Formal analysis of PKCS# 11
S Delaune, S Kremer, G Steel
2008 21st IEEE Computer Security Foundations Symposium, 331-344, 2008
782008
Formal analysis of protocols based on TPM state registers
S Delaune, S Kremer, MD Ryan, G Steel
2011 IEEE 24th Computer Security Foundations Symposium, 66-80, 2011
762011
A formal analysis of authentication in the TPM
S Delaune, S Kremer, MD Ryan, G Steel
International Workshop on Formal Aspects in Security and Trust, 111-125, 2010
662010
YubiSecure? Formal security analysis results for the Yubikey and YubiHSM
R Künnemann, G Steel
Security and Trust Management: 8th International Workshop, STM 2012, Pisa …, 2013
622013
Formal analysis of privacy for vehicular mix-zones
M Dahl, S Delaune, G Steel
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
582010
Formal security analysis of PKCS# 11 and proprietary extensions
S Delaune, S Kremer, G Steel
Journal of Computer Security 18 (6), 1211-1245, 2010
522010
Formal analysis of PIN block attacks
G Steel
Theoretical Computer Science 367 (1-2), 257-270, 2006
522006
Automatic analysis of the security of XOR-based key management schemes
V Cortier, G Keighren, G Steel
International Conference on Tools and Algorithms for the Construction and …, 2007
492007
Analysing PKCS# 11 key management APIs with unbounded fresh data
S Fröschle, G Steel
Joint Workshop on Automated Reasoning for Security Protocol Analysis and …, 2009
482009
Type-based analysis of PIN processing APIs
M Centenaro, R Focardi, FL Luccio, G Steel
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
392009
A generic security API for symmetric key management on cryptographic devices
V Cortier, G Steel
European Symposium on Research in Computer Security, 605-620, 2009
342009
Attacking group protocols by refuting incorrect inductive conjectures
G Steel, A Bundy
Journal of Automated Reasoning 36, 149-176, 2006
282006
Deduction with XOR constraints in security API modelling
G Steel
International Conference on Automated Deduction, 322-336, 2005
282005
Finding counterexamples to inductive conjectures and discovering security protocol attacks
G Steel, A Bundy, E Denney
Proceedings of 2002 Workshop on Foundations of Computer Security, 49-58, 2002
282002
Security for key management interfaces
S Kremer, G Steel, B Warinschi
2011 IEEE 24th Computer Security Foundations Symposium, 266-280, 2011
272011
Artificial intelligence and scientific creativity
S Colton, G Steel
Artificial Intelligence and the Study of Behaviour Quarterly 102, 1999
271999
Security analysis of the W3C web cryptography API
K Cairns, H Halpin, G Steel
Security Standardisation Research: Third International Conference, SSR 2016 …, 2016
262016
An introduction to security API analysis
R Focardi, FL Luccio, G Steel
International School on Foundations of Security Analysis and Design, 35-65, 2011
232011
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20