A derivation system and compositional logic for security protocols A Datta, A Derek, JC Mitchell, D Pavlovic Journal of Computer Security 13 (3), 423-482, 2005 | 207 | 2005 |
A new description of orthogonal bases B Coecke, D Pavlovic, J Vicary Mathematical structures in computer science 23 (3), 555-567, 2013 | 200 | 2013 |
Quantum measurements without sums B Coecke, D Pavlovic Mathematics of Quantum Computation and Quantum Technology, 577-620, 2007 | 170 | 2007 |
A compositional logic for proving security properties of protocols N Durgin, J Mitchell, D Pavlovic Journal of Computer Security 11 (4), 677-721, 2003 | 168 | 2003 |
Distance bounding protocols: Authentication logic analysis and collusion attacks C Meadows, R Poovendran, D Pavlovic, LW Chang, P Syverson Secure localization and time synchronization for wireless sensor and ad hoc …, 2007 | 115 | 2007 |
A derivation system for security protocols and its logical formalization A Datta, A Derek, JC Mitchell, D Pavlovic 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings., 109-125, 2003 | 110 | 2003 |
Secure protocol composition A Datta, A Derek, JC Mitchell, D Pavlovic Proceedings of the 2003 ACM workshop on Formal methods in security …, 2003 | 109 | 2003 |
Classical and quantum structuralism B Coecke, EO Paquette, D Pavlovic Semantic Techniques in Quantum Computation, 29-69, 2008 | 108* | 2008 |
A compositional logic for protocol correctness N Durgin, J Mitchell, D Pavlovic Proceedings 14th IEEE Computer Security Foundations Workshop, 2001., 241,242 …, 2001 | 99 | 2001 |
Calculus in coinductive form D Pavlovic, MH Escardó Proceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science …, 1998 | 95 | 1998 |
An encapsulated authentication logic for reasoning about key distribution protocols I Cervesato, C Meadows, D Pavlovic 18th IEEE Computer Security Foundations Workshop (CSFW'05), 48-61, 2005 | 70 | 2005 |
Predicates and fibrations: From type theoretical to category theoretical presentation of constructive logic. D Pavlovic | 61 | 1992 |
Deriving, attacking and defending the GDOI protocol C Meadows, D Pavlovic Computer Security–ESORICS 2004: 9th European Symposium on Research in …, 2004 | 56 | 2004 |
Monoidal computer I: Basic computability by string diagrams D Pavlovic Information and computation 226, 94-116, 2013 | 55 | 2013 |
Abstraction and refinement in protocol derivation A Datta, A Derek, JC Mitchell, D Pavlovic Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 30-45, 2004 | 54 | 2004 |
Composition and refinement of behavioral specifications D Pavlovic, DR Smith Proceedings 16th Annual International Conference on Automated Software …, 2001 | 54 | 2001 |
Testing semantics: Connecting processes and process logics D Pavlovic, M Mislove, JB Worrell Algebraic Methodology and Software Technology: 11th International Conference …, 2006 | 51 | 2006 |
Quantum and classical structures in nondeterminstic computation D Pavlovic International Symposium on Quantum Interaction, 143-157, 2009 | 50 | 2009 |
Categorical logic of names and abstraction in action calculi D Pavlović Mathematical Structures in Computer Science 7 (6), 619-637, 1997 | 50 | 1997 |
Software development by refinement D Pavlovic, DR Smith Formal Methods at the Crossroads. From Panacea to Foundational Support: 10th …, 2003 | 49 | 2003 |