Muhammad Torabi Dashti

According to our database1, Muhammad Torabi Dashti authored at least 50 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Theory of Black-Box Tests.
CoRR, 2020

2017
Force Open: Lightweight black box file repair.
Digit. Investig., 2017

Test execution checkpointing for web applications.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

An Anti-pattern for Misuse Cases.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

Tests and Refutation.
Proceedings of the Automated Technology for Verification and Analysis, 2017

2016
Security Testing Beyond Functional Tests.
Proceedings of the Engineering Secure Software and Systems - 8th International Symposium, 2016

Access Control Synthesis for Physical Spaces.
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016

2015
Scalable, privacy preserving radio-frequency identification protocol for the internet of things.
Concurr. Comput. Pract. Exp., 2015

Semantic Vacuity.
Proceedings of the 22nd International Symposium on Temporal Representation and Reasoning, 2015

Derailing Attacks.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Derailing Attacks (Transcript of Discussion).
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

2014
LTL is closed under topological closure.
Inf. Process. Lett., 2014

Model-Based Detection of CSRF.
Proceedings of the ICT Systems Security and Privacy Protection, 2014

Decentralized Composite Access Control.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

Anchored LTL separation.
Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 2014

Fail-Secure Access Control.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Semi-valid input coverage for fuzz testing.
Proceedings of the International Symposium on Software Testing and Analysis, 2013

VERA: A Flexible Model-Based Vulnerability Testing Tool.
Proceedings of the Sixth IEEE International Conference on Software Testing, 2013

2012
Efficiency of optimistic fair exchange using trusted devices.
ACM Trans. Auton. Adapt. Syst., 2012

Extended beam search for non-exhaustive state space analysis.
J. Log. Algebraic Methods Program., 2012

The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Analysis of Communicating Authorization Policies.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

SECFUZZ: Fuzz-testing security protocols.
Proceedings of the 7th International Workshop on Automation of Software Test, 2012

2011
A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Complexity of fairness constraints for the Dolev-Yao attacker model.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Constructing Mid-Points for Two-Party Asynchronous Protocols.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011

Risk Balance in Optimistic Non-repudiation Protocols.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Integrated Specification and Verification of Security Protocols and Policies.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

2010
Fair Exchange.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

Semi-linear Parikh Images of Regular Expressions via Reduction.
Proceedings of the Mathematical Foundations of Computer Science 2010, 2010

Partial Order Reduction for Branching Security Protocols.
Proceedings of the 10th International Conference on Application of Concurrency to System Design, 2010

2009
Sums of powers via integration
CoRR, 2009

Optimistic Fair Exchange Using Trusted Devices.
Proceedings of the Stabilization, 2009

Minimal Message Complexity of Asynchronous Multi-party Contract Signing.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme.
Fundam. Informaticae, 2008

Data Failures.
Proceedings of the Distributed Computing, 22nd International Symposium, 2008

Fair Exchange Is Incomparable to Consensus.
Proceedings of the Theoretical Aspects of Computing, 2008

2007
Distributed Partial Order Reduction for Security Protocols.
Proceedings of the 6th International Workshop on Parallel and Distributed Methods in verifiCation, 2007

Keeping Secrets in Resource Aware Components.
Proceedings of the Fifth Workshop on Quantitative Aspects of Programming Languages, 2007

Distributed Analysis with <i>mu</i> CRL: A Compendium of Case Studies.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007

A Hybrid PKI-IBC Based Ephemerizer System.
Proceedings of the New Approaches for Security, 2007

Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme.
Proceedings of the International Symposium on Fundamentals of Software Engineering, 2007

Pruning State Spaces with Extended Beam Search.
Proceedings of the Automated Technology for Verification and Analysis, 2007

Risk Balance in Exchange Protocols.
Proceedings of the Advances in Computer Science, 2007

A Certified Email Protocol Using Key Chains.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
A Framework for Automatically Checking Anonymity with <i>mu</i> CRL.
Proceedings of the Trustworthy Global Computing, Second Symposium, 2006

An intruder model for verifying liveness in security protocols.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

2005
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
Formal Analysis of a Fair Payment Protocol.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

A fuzzy automaton for control applications.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2004


  Loading...