The AVISPA tool for the automated validation of internet security protocols and applications A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ... Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005 | 1593 | 2005 |
SecureUML: A UML-based modeling language for model-driven security T Lodderstedt, D Basin, J Doser International Conference on the Unified Modeling Language, 426-441, 2002 | 1178 | 2002 |
The TAMARIN prover for the symbolic analysis of security protocols S Meier, B Schmidt, C Cremers, D Basin Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013 | 826 | 2013 |
Handbook of model checking Springer 10, 978-3, 2018 | 759* | 2018 |
Model driven security: From UML models to access control infrastructures D Basin, J Doser, T Lodderstedt ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (1), 39-91, 2006 | 721 | 2006 |
OFMC: A symbolic model checker for security protocols D Basin, S Mödersheim, L Vigano International Journal of Information Security 4, 181-208, 2005 | 669 | 2005 |
An information-theoretic model for adaptive side-channel attacks B Köpf, D Basin Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 457 | 2007 |
A formal analysis of 5G authentication D Basin, J Dreier, L Hirschi, S Radomirovic, R Sasse, V Stettler Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 436 | 2018 |
Distributed usage control A Pretschner, M Hilty, D Basin Communications of the ACM 49 (9), 39-44, 2006 | 348 | 2006 |
Decentralized privacy-preserving proximity tracing C Troncoso, M Payer, JP Hubaux, M Salathé, J Larus, E Bugnion, ... arXiv preprint arXiv:2005.12273, 2020 | 333 | 2020 |
Automated analysis of Diffie-Hellman protocols and advanced security properties B Schmidt, S Meier, C Cremers, D Basin 2012 IEEE 25th Computer Security Foundations Symposium, 78-94, 2012 | 325 | 2012 |
An on-the-fly model-checker for security protocol analysis D Basin, S Mödersheim, L Vigano Computer Security–ESORICS 2003: 8th European Symposium on Research in …, 2003 | 258 | 2003 |
A policy language for distributed usage control M Hilty, A Pretschner, D Basin, C Schaefer, T Walter Computer Security–ESORICS 2007: 12th European Symposium On Research In …, 2007 | 237 | 2007 |
Rippling: meta-level guidance for mathematical reasoning A Bundy, D Basin, D Hutter, A Ireland Cambridge Univ Press, 2005 | 214 | 2005 |
Monitoring metric first-order temporal properties D Basin, F Klaedtke, S Müller, E Zălinescu Journal of the ACM (JACM) 62 (2), 1-45, 2015 | 211 | 2015 |
Sok: Secure data deletion J Reardon, D Basin, S Capkun 2013 IEEE symposium on security and privacy, 301-315, 2013 | 206 | 2013 |
Model driven security for process-oriented systems D Basin, J Doser, T Lodderstedt Proceedings of the eighth ACM symposium on Access control models and …, 2003 | 202 | 2003 |
On obligations M Hilty, D Basin, A Pretschner Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 183 | 2005 |
ARPKI: Attack resilient public-key infrastructure D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 173 | 2014 |
Automated analysis of security-design models D Basin, M Clavel, J Doser, M Egea Information and Software Technology 51 (5), 815-831, 2009 | 169 | 2009 |