Formalization and Verification of a Mail Server in Coq, ISSS, pp.217-233, 2003. ,
DOI : 10.1007/3-540-36532-X_14
Towards a Formal Foundation of Web Security, 2010 23rd IEEE Computer Security Foundations Symposium, pp.290-304, 2010. ,
DOI : 10.1109/CSF.2010.27
Securing frame communication in browsers, Proc. of 17th USENIX Security Symposium, 2008. ,
DOI : 10.1145/1516046.1516066
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.3290
Verified Reference Implementations of WS-Security Protocols, Proc. of 3rd WS- FM, pp.88-106, 2006. ,
DOI : 10.1007/11841197_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.3389
Industrial Use of Formal Methods for a High-Level Security Evaluation, Proc. of 15th Intl. Symposium on Formal Methods, pp.198-213, 2008. ,
DOI : 10.1007/978-3-540-68237-0_15
WSAT: A Tool for Formal Analysis of Web Services, Proc. of 16th Int. Conf. on Computer Aided Verification, pp.510-514 ,
DOI : 10.1007/978-3-540-27813-9_48
GlobalPlatform Card Specification 2.2 -Remote Application Management over HTTP -Amendment B, version 0, 2008. ,
Formal Verification of Web Applications Modeled by Communicating Automata, Proc. of FORTE 2004, pp.115-132, 2004. ,
DOI : 10.1109/WSE.2002.1134088
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.2669
Finite-state analysis of ssl 3.0, Proc. of 7th USENIX Security Symposium, pp.201-216, 1998. ,
Modelling and verifying key-exchange protocols using CSP and FDR, Proceedings The Eighth IEEE Computer Security Foundations Workshop, pp.98-107, 1995. ,
DOI : 10.1109/CSFW.1995.518556
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.24.2999
Formal Verification of Web Service Interaction Contracts, 2008 IEEE International Conference on Services Computing, pp.525-528, 2008. ,
DOI : 10.1109/SCC.2008.67