Ante Derek

Orcid: 0000-0002-2437-8134

According to our database1, Ante Derek authored at least 26 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Towards automated formal security analysis of SAML V2.0 Web Browser SSO standard - the POST/Artifact use case.
CoRR, 2024

Formal Security Analysis of the AMD SEV-SNP Software Interface.
CoRR, 2024

2023
Flexible Remote Attestation of Pre-SNP SEV VMs Using SGX Enclaves.
IEEE Access, 2023

2022
Automatically Generating Models of IT Systems.
IEEE Access, 2022

Conditional Observational Equivalence and Off-line Guessing Attacks in Multiset Rewriting.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
A Survey on Applications of Formal Methods in Analysis of SCADA Systems.
Proceedings of the Critical Information Infrastructures Security, 2021

2020
Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

Mechanized Formal Model of Bitcoin's Blockchain Validation Procedures.
Proceedings of the 2nd Workshop on Formal Methods for Blockchains, 2020

2019
C<sup>3</sup>PO: cipher construction with cartesian genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

2017
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2007
Formal analysis of security protocols : protocol composition logic.
PhD thesis, 2007

Inductive Proof Method for Computational Secrecy.
IACR Cryptol. ePrint Arch., 2007

Protocol Composition Logic (PCL).
Proceedings of the Computation, Meaning, and Logic: Articles dedicated to Gordon Plotkin, 2007

Inductive Proofs of Computational Secrecy.
Proceedings of the Computer Security, 2007

2006
Compositional analysis of contract-signing protocols.
Theor. Comput. Sci., 2006

Inductive Trace Properties for Computational Security.
IACR Cryptol. ePrint Arch., 2006

Key Exchange Protocols: Security Definition, Proof Method and Applications.
IACR Cryptol. ePrint Arch., 2006

Computationally Sound Compositional Logic for Key Exchange Protocols.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Secrecy Analysis in Protocol Composition Logic.
Proceedings of the Advances in Computer Science, 2006

2005
A derivation system and compositional logic for security protocols.
J. Comput. Secur., 2005

Games and the Impossibility of Realizable Ideal Functionality.
IACR Cryptol. ePrint Arch., 2005

Probabilistic Polynomial-Time Semantics for a Protocol Security Logic.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

A modular correctness proof of IEEE 802.11i and TLS.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Abstraction and Refinement in Protocol Derivation.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
A Derivation System for Security Protocols and its Logical Formalization.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

Secure protocol composition.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003


  Loading...