F. Javier Thayer

According to our database1, F. Javier Thayer authored at least 29 papers between 1988 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Enrich-by-Need Protocol Analysis for Diffie-Hellman.
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019

2018
Enrich-by-need Protocol Analysis for Diffie-Hellman (Extended Version).
CoRR, 2018

2014
Modeling Diffie-Hellman Derivability for Automated Analysis.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

2010
Metric Strand Spaces for Locale Authentication Protocols.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

2007
Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions.
Proceedings of the 23rd Conference on the Mathematical Foundations of Programming Semantics, 2007

Searching for Shapes in Cryptographic Protocols.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007

Completeness of the Authentication Tests.
Proceedings of the Computer Security, 2007

2006
Searching for Shapes in Cryptographic Protocols (extended version).
IACR Cryptol. ePrint Arch., 2006

2004
The faithfulness of abstract protocol analysis: Message authentication.
J. Comput. Secur., 2004

Trust Management in Strand Spaces: A Rely-Guarantee Method.
Proceedings of the Programming Languages and Systems, 2004

2002
Authentication tests and the structure of bundles.
Theor. Comput. Sci., 2002

2000
Authentication Tests.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Authentication and Confidentiality via IPSEC.
Proceedings of the Computer Security, 2000

Protocol Independence through Disjoint Encryption.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
Strand Spaces: Proving Security Protocols Correct.
J. Comput. Secur., 1999

Trust: Benefits, Models, and Mechanisms.
Proceedings of the Secure Internet Programming, 1999

Mixed Strand Spaces.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
Strand Spaces: Why is a Security Protocol Correct?
Proceedings of the Security and Privacy, 1998

Honest Ideals on Strand Spaces.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1996
IMPS: An Updated System Description.
Proceedings of the Automated Deduction - CADE-13, 13th International Conference on Automated Deduction, New Brunswick, NJ, USA, July 30, 1996

1995
Context in Mathematical Reasoning and Computation.
J. Symb. Comput., 1995

1994
Proof Script Pragmatics in IMPS.
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994

1993
IMPS: An Interactive Mathematical Proof System.
J. Autom. Reason., 1993

Reasoning with Contexts.
Proceedings of the Design and Implementation of Symbolic Computation Systems, 1993

1992
IMPS: System Description.
Proceedings of the Automated Deduction, 1992

Little Theories.
Proceedings of the Automated Deduction, 1992

1989
Security Properties Consistent with the Testing Semantics for Communicating Processes.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

1988
Stating Security Requirements with Tolerable Sets.
ACM Trans. Comput. Syst., 1988

Security and the Composition of Machines.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988


  Loading...