Sebastian Mödersheim

Orcid: 0000-0002-6901-8319

Affiliations:
  • Technical University of Denmark


According to our database1, Sebastian Mödersheim authored at least 62 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Stateful Protocol Composition in Isabelle/HOL.
ACM Trans. Priv. Secur., August, 2023

Private Authentication with Alpha-Beta Privacy.
Proceedings of the Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023, 2023

2022
Rewriting Privacy.
Proceedings of the Rewriting Logic and Its Applications - 14th International Workshop, 2022

Privacy as Reachability.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

2021
rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things.
Sensors, 2021

Deciding a Fragment of (α , β )-Privacy.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World.
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, Juni 1-2, 2021., 2021

Performing Security Proofs of Stateful Protocols.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Vertical Composition and Sound Payload Abstraction for Stateful Protocols.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Three Branches of Accountability.
Proceedings of the Protocols, Strands, and Logic, 2021

Security Protocols as Choreographies.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Automated Stateful Protocol Verification.
Arch. Formal Proofs, 2020

Stateful Protocol Composition and Typing.
Arch. Formal Proofs, 2020

Accountable Trust Decisions: A Semantic Approach.
Proceedings of the Open Identity Summit 2020, 26. - 27.05.2020, Copenhagen, Denmark., 2020

HotSpot: Hot Issues in Security Principles and Trust 2020.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Alpha-Beta Privacy.
ACM Trans. Priv. Secur., 2019

GTPL: A Graphical Trust Policy Language.
Proceedings of the Open Identity Summit 2019, 2019

TPL: A Trust Policy Language.
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019

Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Stateful Protocol Composition.
Proceedings of the Computer Security, 2018

A Typing Result for Stateful Protocols.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Security protocol specification and verification with AnBx.
J. Inf. Secur. Appl., 2016

AIF-ω: Set-Based Protocol Abstraction with Countable Families.
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016

2015
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment.
Proceedings of the Computer Security - ESORICS 2015, 2015

Set-Pi: Set Membership p-Calculus.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Alice and Bob: Reconciling Formal Models and Implementation.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

Proactive Security Analysis of Changes in Virtualized Infrastructures.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
A Sound Abstraction of the Parsing Problem.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Sufficient conditions for vertical composition of security protocols.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Lazy Mobile Intruders.
Proceedings of the Principles of Security and Trust - Second International Conference, 2013

Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013

Defining Privacy Is Supposed to Be Easy.
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2013

2012
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012

Deciding Security for a Fragment of ASLan.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Verifying SeVeCom using set-based abstraction.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Diffie-Hellman without Difficulty.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Towards Formal Validation of Trust and Security in the Internet of Services.
Proceedings of the Future Internet, 2011

Vertical Protocol Composition.
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011

Automated verification of virtualized infrastructures.
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011

2010
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.
J. Comput. Secur., 2010

A card requirements language enabling privacy-preserving access control.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

A Formal Model of Identity Mixer.
Proceedings of the Formal Methods for Industrial Critical Systems, 2010

ASLan++ - A Formal Security Specification Language for Distributed Systems.
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010

Abstraction by set-membership: verifying security protocols and web services with databases.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Integrating Automated and Interactive Protocol Verification.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols.
Proceedings of the Foundations of Security Analysis and Design V, 2009

Secure Pseudonymous Channels.
Proceedings of the Computer Security, 2009

Algebraic Properties in Alice and Bob Notation.
Proceedings of the The Forth International Conference on Availability, 2009

2008
On the relationships between models in protocol verification.
Inf. Comput., 2008

2007
Models and methods for the automated analysis of security protocols.
PhD thesis, 2007

2006
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.
IACR Cryptol. ePrint Arch., 2006

Formalizing and Analyzing Sender Invariance.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2005
OFMC: A symbolic model checker for security protocols.
Int. J. Inf. Sec., 2005

Algebraic Intruder Deductions.
Proceedings of the Logic for Programming, 2005

The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
The ASW Protocol Revisited: A Unified View.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

A Formalization of Off-Line Guessing for Security Protocol Analysis.
Proceedings of the Logic for Programming, 2004

2003
An On-the-Fly Model-Checker for Security Protocol Analysis.
Proceedings of the Computer Security, 2003

CDiff: a new reduction technique for constraint-based analysis of security protocols.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
The AVISS Security Protocol Analysis Tool.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2000
B2M: A Semantic Based Tool for BLIF Hardware Descriptions.
Proceedings of the Formal Methods in Computer-Aided Design, Third International Conference, 2000


  Loading...