Stephen H. Brackin

According to our database1, Stephen H. Brackin authored at least 11 papers between 1989 and 1999.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

1999
Implementing Effective Automatic Cryptographic Protocol Analysis.
Proceedings of the 14th IEEE International Conference on Automated Software Engineering, 1999

Using Checkable Types in Automatic Protocol Analysis.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Evaluating and Improving Protocol Analysis by Automatic Proof.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
An Interface Specification Language for Automatically Analyzing Cryptographic Protocols.
Proceedings of the Network and Distributed System Security Symposium, 1997

1996
Deciding Cryptographic Protocol Adequacy with HOL: The Implementation.
Proceedings of the Theorem Proving in Higher Order Logics, 9th International Conference, 1996

A HOL extension of GNY for automatically analyzing cryptographic protocols.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

Verifying The Correctness Of Cryptographic Protocols Using "Convince".
Proceedings of the 12th Annual Computer Security Applications Conference (ACSAC 1996), 1996

1995
Deciding Cryptographic Protocol Adequacy with HOL.
Proceedings of the Higher Order Logic Theorem Proving and Its Applications, 1995

1994
Providing Tractable Security Analysis in HOL.
Proceedings of the Higher Order Logic Theorem Proving and Its Applications, 1994

1993
Server-Process Restrictiveness in HOL.
Proceedings of the Higher Order Logic Theorem Proving and its Applications, 1993

1989
Partitions with no Coarsenings of Higher Degree.
Math. Log. Q., 1989


  Loading...