Benjamin W. Long

According to our database1, Benjamin W. Long authored at least 9 papers between 2003 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Security in Depth through Smart Space Cascades.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2007
Cross-Layer Verification of Type Flaw Attacks on Security Protocols.
Proceedings of the Computer Science 2007. Proceedings of the Thirtieth Australasian Computer Science Conference (ACSC2007). Ballarat, Victoria, Australia, January 30, 2007

2006
Specifying and verifying key distribution protocols: a layered approach
PhD thesis, 2006

Formally Analysing a Security Protocol for Replay Attacks.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006

2005
Formal Verification of a Type Flaw Attack on a Security Protocol Using Object-Z.
Proceedings of the ZB 2005: Formal Specification and Development in Z and B, 2005

2003
Formal Specification of Java Concurrency to Assist Software Verification.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

A Z Based Approach to Verifying Security Protocols.
Proceedings of the Formal Methods and Software Engineering, 2003

Formal Verification of Type Flaw Attacks in Security Protocols.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

Formalising Key-Distribution in the Presence of Trust using Object-Z.
Proceedings of the ACSW Frontiers 2003, 2003 ACSW Workshops, 2003


  Loading...