A meta-notation for protocol analysis I Cervesato, NA Durgin, PD Lincoln, JC Mitchell, A Scedrov Proceedings of the 12th IEEE Computer Security Foundations Workshop, 55-69, 1999 | 379 | 1999 |
A linear logical framework I Cervesato, F Pfenning Information and computation 179 (1), 19-75, 2002 | 304 | 2002 |
A concurrent logical framework I: Judgments and properties K Watkins, I Cervesato, F Pfenning, D Walker Technical Report CMU-CS-02-101, Department of Computer Science, Carnegie …, 2003 | 233 | 2003 |
The logic of authentication protocols P Syverson, I Cervesato International school on foundations of security analysis and design, 63-137, 2000 | 226 | 2000 |
The Dolev-Yao intruder is the most powerful attacker I Cervesato 16th Annual Symposium on Logic in Computer Science—LICS 1, 1-2, 2001 | 148 | 2001 |
On the detection of kernel-level rootkits using hardware performance counters B Singh, D Evtyushkin, J Elwell, R Riley, I Cervesato Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 147 | 2017 |
Breaking and fixing public-key Kerberos I Cervesato, AD Jaggard, A Scedrov, JK Tsay, C Walstad Information and Computation 206 (2-4), 402-424, 2008 | 126 | 2008 |
A concurrent logical framework: The propositional fragment K Watkins, I Cervesato, F Pfenning, D Walker International Workshop on Types for Proofs and Programs, 355-377, 2003 | 119 | 2003 |
Relating strands and multiset rewriting for security protocol analysis I Cervesato, N Durgin, J Mitchell, P Lincoln, A Scedrov Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 35-51, 2000 | 116 | 2000 |
A concurrent logical framework II: Examples and applications I Cervesato, F Pfenning, D Walker, K Watkins Technical Report CMU-CS-02-102, Department of Computer Science, Carnegie …, 2002 | 114 | 2002 |
A Linear Spine Calculus I Cervesato, F Pfenning | 113* | 1997 |
Efficient resource management for linear logic proof search I Cervesato, JS Hodas, F Pfenning Theoretical Computer Science 232 (1-2), 133-163, 2000 | 99 | 2000 |
A Formal Analysis of Some Properties of Kerberos 5 Using MSR. F Butler, I Cervesato, AD Jaggard, A Scedrov CSFW 2, 175-190, 2002 | 93 | 2002 |
Dolev-Yao is no better than Machiavelli P Syverson, C Meadows, I Cervesato First Workshop on Issues in the Theory of Security—WITS’00, 87-92, 2000 | 92 | 2000 |
Formal analysis of Kerberos 5 F Butler, I Cervesato, AD Jaggard, A Scedrov, C Walstad Theoretical Computer Science 367 (1-2), 57-87, 2006 | 90 | 2006 |
Relating state-based and process-based concurrency through linear logic (full-version) I Cervesato, A Scedrov Information and Computation 207 (10), 1044-1077, 2009 | 89 | 2009 |
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos M Backes, I Cervesato, AD Jaggard, A Scedrov, JK Tsay Computer Science Department, 8, 2006 | 88 | 2006 |
Efficient resource management for linear logic proof search I Cervesato, JS Hodas, F Pfenning Extensions of Logic Programming: 5th International Workshop, ELP'96 Leipzig …, 1996 | 74 | 1996 |
An encapsulated authentication logic for reasoning about key distribution protocols I Cervesato, C Meadows, D Pavlovic 18th IEEE Computer Security Foundations Workshop (CSFW'05), 48-61, 2005 | 70 | 2005 |
Typed MSR: Syntax and examples I Cervesato International Workshop on Mathematical Methods, Models, and Architectures …, 2001 | 65 | 2001 |