David A. Basin
#143,683
Most Influential Person Now
David A. Basin's AcademicInfluence.com Rankings
David A. Basincomputer-science Degrees
Computer Science
#7059
World Rank
#7435
Historical Rank
Operating Systems
#12
World Rank
#12
Historical Rank
Information Security
#18
World Rank
#18
Historical Rank
Database
#4119
World Rank
#4285
Historical Rank

Download Badge
Computer Science
David A. Basin's Degrees
- PhD Computer Science Stanford University
- Masters Computer Science Stanford University
- Bachelors Computer Science ETH Zurich
Similar Degrees You Can Earn
Why Is David A. Basin Influential?
(Suggest an Edit or Addition)David A. Basin's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (2005) (1285)
- SecureUML: A UML-Based Modeling Language for Model-Driven Security (2002) (941)
- Model driven security: From UML models to access control infrastructures (2006) (554)
- The TAMARIN Prover for the Symbolic Analysis of Security Protocols (2013) (492)
- OFMC: A symbolic model checker for security protocols (2005) (414)
- An information-theoretic model for adaptive side-channel attacks (2007) (368)
- Decentralized Privacy-Preserving Proximity Tracing (2020) (279)
- A Formal Analysis of 5G Authentication (2018) (249)
- Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties (2012) (233)
- An On-the-Fly Model-Checker for Security Protocol Analysis (2003) (193)
- Rippling - meta-level guidance for mathematical reasoning (2005) (184)
- A Policy Language for Distributed Usage Control (2007) (179)
- Model driven security for process-oriented systems (2003) (169)
- Secure neighborhood discovery: a fundamental element for mobile ad hoc networking (2008) (160)
- On Obligations (2005) (146)
- SoK: Secure Data Deletion (2013) (143)
- Multi-assignment clustering for Boolean data (2009) (142)
- Logic Program Synthesis via Proof Planning (1992) (139)
- Monitoring Metric First-Order Temporal Properties (2015) (138)
- ARPKI: Attack Resilient Public-Key Infrastructure (2014) (133)
- Automated analysis of security-design models (2009) (130)
- Distributed usage control (2006) (127)
- OFMC: A Symbolic Model-Checker for Security Protocols (2004) (124)
- Search in Games with Incomplete Information: A Case Study Using Bridge Card Play (1998) (118)
- A decade of model-driven security (2011) (102)
- Provably repairing the ISO/IEC 9798 standard for entity authentication (2012) (92)
- SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle (2006) (90)
- A probabilistic approach to hybrid role mining (2009) (89)
- Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory (2012) (87)
- MONPOLY: Monitoring Usage-Control Policies (2011) (86)
- Automated Symbolic Proofs of Observational Equivalence (2015) (85)
- Policy Monitoring in First-Order Temporal Logic (2010) (79)
- QUBOS: Deciding Quantified Boolean Logic Using Propositional Satisfiability Solvers (2002) (78)
- Enforceable Security Policies Revisited (2012) (76)
- Runtime Monitoring of Metric First-order Temporal Properties (2008) (76)
- On the definition of role mining (2010) (74)
- Mechanisms for usage control (2008) (73)
- Monitoring security policies with metric first-order temporal logic (2010) (70)
- Labelled Propositional Modal Logics: Theory and Practice (1997) (69)
- The AVISS Security Protocol Analysis Tool (2002) (69)
- Cryptographically sound theorem proving (2006) (67)
- Metalogical frameworks (1993) (67)
- A class of probabilistic models for role engineering (2008) (64)
- On Purpose and by Necessity: Compliance Under the GDPR (2018) (64)
- On Secure Data Deletion (2016) (62)
- Hardware Verification using Monadic Second-Order Logic (1995) (60)
- Modeling and Analyzing Security in the Presence of Compromising Adversaries (2010) (60)
- Monitoring of temporal first-order properties with aggregations (2013) (59)
- SSL/TLS Session-Aware User Authentication (2008) (59)
- Secure data deletion from persistent media (2013) (58)
- Cutoff Bounds for Consensus Algorithms (2017) (56)
- Lazy Infinite-State Analysis of Security Protocols (1999) (54)
- Automated complexity analysis based on ordered resolution (2001) (54)
- Synthesis of Programs in Computational Logic (2004) (53)
- Bounded Model Construction for Monadic Second-Order Logics (2000) (53)
- Developing topology discovery in Event-B (2009) (50)
- A calculus for and termination of rippling (1996) (49)
- SECFUZZ: Fuzz-testing security protocols (2012) (49)
- Firewall Conformance Testing (2005) (49)
- Natural Deduction for Non-Classical Logics (1998) (48)
- Formal Reasoning about Physical Properties of Security Protocols (2011) (48)
- Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks (2009) (47)
- Algorithms for monitoring real-time properties (2011) (47)
- Short paper: detection of GPS spoofing attacks in power grids (2014) (47)
- Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols (2003) (46)
- Election Security and Economics: It's All About Eve (2017) (46)
- Middle-Out Reasoning for Logic Program Synthesis (1993) (45)
- Complexity analysis based on ordered resolution (1996) (45)
- Dynamic enforcement of abstract separation of duty constraints (2009) (45)
- Middle-out reasoning for synthesis and induction (1996) (44)
- Automated Verification of Group Key Agreement Protocols (2014) (44)
- Code Generation for Event-B (2014) (44)
- Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives (2011) (44)
- Topology dynamics and routing for predictable mobile networks (2008) (43)
- Role Mining with Probabilistic Models (2012) (43)
- Scalable Offline Monitoring (2014) (41)
- Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure (2016) (41)
- Automata based symbolic reasoning in hardware verification (1998) (40)
- Algebraic Intruder Deductions (2005) (40)
- Mining ABAC Rules from Sparse Logs (2018) (39)
- Know Your Enemy: Compromising Adversaries in Protocol Analysis (2014) (39)
- Optimal workflow-aware authorizations (2012) (39)
- Internet backbones in space (2020) (38)
- The MonPoly Monitoring Tool (2017) (38)
- A theoretical and empirical investigation of search in imperfect information games (2001) (38)
- Monitoring Compliance Policies over Incomplete and Disagreeing Logs (2012) (38)
- CryptHOL: Game-Based Proofs in Higher-Order Logic (2020) (37)
- Modeling Human Errors in Security Protocols (2016) (37)
- Finding Optimal Strategies for Imperfect Information Games (1998) (37)
- Cardinality Estimators do not Preserve Privacy (2018) (36)
- Almost Event-Rate Independent Monitoring of Metric Dynamic Logic (2017) (36)
- Strong Invariants for the Efficient Construction of Machine-Checked Protocol Security Proofs (2010) (36)
- Predictable Mobile Routing for Spacecraft Networks (2013) (35)
- Labelled deduction (2000) (35)
- Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols (2010) (34)
- How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC (2010) (33)
- Coloured Rippling: An Extension of a Theorem Proving Heuristic (1994) (32)
- On the semantics of Alice&Bob specifications of security protocols (2006) (32)
- Rewriting Logic as a Metalogical Framework (2000) (32)
- Experiments in Automating Hardware Verification Using Inductive Proof Planning (1996) (32)
- SSL/TLS session-aware user authentication revisited (2008) (31)
- Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis (2005) (31)
- Metareasoning about Security Protocols using Distributed Temporal Logic (2005) (31)
- Securing the Distribution and Storage of Secrets with Trusted Platform Modules (2007) (30)
- Difference Unification (1993) (30)
- Improving the Security of Cryptographic Protocol Standards (2015) (30)
- Automatically deriving information-theoretic bounds for adaptive side-channel attacks (2011) (30)
- Model driven security (2006) (30)
- The Boyer-Moore Prover and Nuprl: an experimental comparison (1991) (30)
- An Adaptation of Proof-Planning to Declarer Play in Bridge (1992) (29)
- Monitoring the GDPR (2019) (29)
- Labelled Modal Logics: Quantifiers (1998) (28)
- Symbolically analyzing security protocols using tamarin (2017) (27)
- User-level secure deletion on log-structured file systems (2012) (27)
- Difference Matching (1992) (27)
- Let's Get Physical: Models and Methods for Real-World Security Protocols (2009) (27)
- Monitoring Data Usage in Distributed Systems (2013) (27)
- Reflective metalogical frameworks (2004) (27)
- Networking in Heaven as on Earth (2018) (27)
- Almost Event-Rate Independent Monitoring of Metric Temporal Logic (2017) (26)
- Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (2000) (26)
- Efficient analysis of pattern-based constraint specifications (2010) (25)
- Failure-aware Runtime Verification of Distributed Systems (2015) (25)
- A metamodel-based approach for analyzing security-design models (2007) (25)
- Separation of duties as a service (2011) (24)
- A Model-Driven Methodology for Developing Secure Data-Management Applications (2014) (24)
- Monitoring Usage-Control Policies in Distributed Systems (2011) (24)
- Alethea: A Provably Secure Random Sample Voting Protocol (2018) (24)
- Optimal Security-Aware Query Processing (2014) (24)
- Automatic Generation of Smart, Security-Aware GUI Models (2010) (23)
- Experience with F S 0 as a Framework Theory (1993) (23)
- CDiff: a new reduction technique for constraint-based analysis of security protocols (2003) (23)
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (2010) (23)
- Scalable offline monitoring of temporal specifications (2016) (22)
- A Formally Verified Monitor for Metric First-Order Temporal Logic (2019) (21)
- AERIAL: Almost Event-Rate Independent Algorithms for Monitoring Metric Regular Properties (2017) (21)
- Optimal Play against Best Defence: Complexity and Heuristics (1998) (21)
- Securing Databases from Probabilistic Inference (2017) (21)
- BAP: Broadcast Authentication Using Cryptographic Puzzles (2007) (20)
- A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols (2020) (20)
- A Term Equality Problem Equivalent to Graph Isomorphism (1994) (20)
- Verification Of Combinational Logic in Nuprl (1989) (20)
- Specifying and analyzing security automata using CSP-OZ (2007) (20)
- Model Checking Security Protocols (2018) (20)
- Decentralized Composite Access Control (2014) (20)
- Java Bytecode Verification by Model Checking (1999) (20)
- A Formally Verified, Optimized Monitor for Metric First-Order Dynamic Logic (2020) (19)
- The Virtual Environment (2011) (19)
- A framework for program development based on schematic proof (1993) (18)
- Verified Bytecode Model Checkers (2002) (18)
- Greedily computing associative aggregations on sliding windows (2015) (18)
- Towards an awareness-based semantics for security protocol analysis (2001) (18)
- Formalizing Constructive Cryptography using CryptHOL (2019) (18)
- Deconstructing Alice and Bob (2005) (18)
- Refining Key Establishment (2012) (18)
- Distributed temporal logic for the analysis of security protocol models (2011) (18)
- Semi-valid input coverage for fuzz testing (2013) (18)
- A Formal Analysis of the CORBA Security Service (2002) (18)
- LISA: A Specification Language Based on WS2S (1997) (17)
- A Complete Characterization of Secure Human-Server Communication (2015) (17)
- Secure Deletion on Log-structured File Systems (2011) (17)
- Timing-Sensitive Information Flow Analysis for Synchronous Systems (2006) (17)
- A comprehensive formal analysis of 5G handover (2021) (16)
- A Modular Presentation of Modal Logics in a Logical Framework (1998) (16)
- The EMV Standard: Break, Fix, Verify (2020) (16)
- Model-Driven Development of a Secure eHealth Application (2014) (16)
- Combining Knowledge and Search to Solve Single-Suit Bridge (2000) (16)
- Combining WS1S and HOL (1998) (16)
- Monitors for Usage Control (2007) (16)
- Logic Frameworks for Logic Programs (1994) (15)
- Efficient construction of machine-checked symbolic protocol security proofs (2013) (15)
- SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust (2019) (15)
- Applied Information Security - a Hands-on Approach (2011) (15)
- Generic System Support for Deductive Program Development (1996) (15)
- Labelled Tableaux for Distributed Temporal Logic (2009) (15)
- Experience with FS 10 0 as a framework theory (1993) (15)
- A New Method for Bounding the Complexity of Modal Logics (1997) (15)
- Model-Driven Development of Security-Aware GUIs for Data-Centric Applications (2011) (14)
- A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) (2007) (14)
- Runtime Verification of Temporal Properties over Out-of-Order Data Streams (2017) (14)
- Keeping data secret under full compromise using porter devices (2010) (14)
- A Higher-order Interpretation of Deductive Tableau (2001) (14)
- Fixing the Achilles Heel of E-Voting: The Bulletin Board (2021) (13)
- Bytecode Verification by Model Checking (2003) (13)
- Igloo: soundly linking compositional refinement and separation logic for distributed system verification (2020) (13)
- Information-Flow Control for Database-Backed Applications (2019) (13)
- Automating Cookie Consent and GDPR Violation Detection (2022) (13)
- Bytecode Model Checking: An Experimental Analysis (2002) (12)
- FAST: An Efficient Decision Procedure for Deduction and Static Equivalence (2011) (12)
- Multi-head Monitoring of Metric Temporal Logic (2019) (12)
- Cryptographically-Sound Protocol-Model Abstractions (2008) (12)
- A Monad-Based Modeling and Verification Toolbox with Application to Security Protocols (2007) (12)
- Alice and Bob Meet Equational Theories (2015) (12)
- Equality of Terms Containing Associative-Commutative Functions and Commutative Binding Operators in Isomorphism Complete (1990) (11)
- Structural and behavioral modeling with monadic logics (1999) (11)
- Formalizing and Analyzing Sender Invariance (2006) (11)
- Automated Reasoning for Security Protocol Analysis (2005) (11)
- Formally verified synthesis of combinational CMOS circuits (1991) (11)
- An Environment For Automated Reasoning About Partial Functions (1988) (11)
- Deriving and Applying Logic Program Transformers (1995) (10)
- Program Development Schemata as Derived Rules (2000) (10)
- Efficient Decision Procedures for Message Deducibility and Static Equivalence (2010) (10)
- Actor Key Compromise: Consequences and Countermeasures (2014) (10)
- Strong and Provably Secure Database Access Control (2015) (10)
- Modeling a Hardware Synthesis Methodology in Isabelle (1996) (10)
- Termination Orderings for Rippling (1994) (10)
- Almost event-rate independent monitoring (2019) (9)
- Large-scale system development using Abstract Data Types and refinement (2016) (9)
- Optimal Proofs for Linear Temporal Logic on Lasso Words (2018) (9)
- Abstract Data Types in Event-B - An Application of Generic Instantiation (2012) (9)
- Controlling Access to Documents: A Formal Access Control Model (2006) (9)
- Structuring Metatheory on Inductive Definitions (1996) (9)
- Analyzing First-Order Role Based Access Control (2015) (9)
- Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004 (2004) (9)
- Building Theories in Nuprl (1989) (9)
- From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries (2009) (9)
- Dispute Resolution in Voting (2020) (8)
- Verification of a Signature Architecture with HOL-Z (2005) (8)
- In the Nick of Time: Proactive Prevention of Obligation Violations (2016) (8)
- Scalable online first-order monitoring (2018) (8)
- Automated Reasoning: Second International Joint Conference, IJCAR 2004, Cork, Ireland, July 4-8, 2004, Proceedings (2004) (8)
- The Next 700 Policy Miners: A Universal Method for Building Policy Miners (2019) (8)
- Some Normalization Properties of Martin-Löf's Type Theory, and Applications (1991) (7)
- Consensus Refined (2015) (7)
- A Calculus for Rippling (1994) (7)
- Formal System Modelling Using Abstract Data Types in Event-B (2014) (7)
- Access Control Synthesis for Physical Spaces (2016) (7)
- Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions (2021) (7)
- Adding Metatheoretic Facilities to First-Order Theories (1996) (7)
- LTL is closed under topological closure (2014) (7)
- Automating Meta-Theory Creation and System Extension (1991) (7)
- Evaluation of ISO/IEC 9798 Protocols (2011) (7)
- Verifying a signature architecture: a comparative case study (2007) (7)
- Privacy-Preserving OpenID Connect (2020) (7)
- Security Testing Beyond Functional Tests (2016) (7)
- Formal Verification of Secure Forwarding Protocols (2021) (7)
- The Complete Guide to SCION: From Design Principles to Formal Verification (2022) (7)
- A Labeled Tableaux System for the Distributed Temporal Logic DTL (2008) (6)
- Multi-head Monitoring of Metric Dynamic Logic (2020) (6)
- Refining security protocols (2017) (6)
- On Real-Time Monitoring with Imprecise Timestamps (2014) (6)
- Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003 (2003) (6)
- User Account Access Graphs (2019) (6)
- The research value of publishing attacks (2012) (6)
- Impossibility Results for Secret Establishment (2010) (6)
- Scalable Online Monitoring of Distributed Systems (2020) (6)
- Differential privacy with partial knowledge. (2019) (6)
- Decision procedures for inductive Boolean functions based on alternating automata (2000) (6)
- A Topography of Labelled Modal Logics (1996) (5)
- Formalization of the Development Process (1999) (5)
- Adaptive Online First-Order Monitoring (2019) (5)
- Fail-Secure Access Control (2014) (5)
- Test execution checkpointing for web applications (2017) (5)
- Logging and Log Analysis (2011) (5)
- Logical framework based program development (1998) (5)
- Proceedings of the Tenth International Conference on Logic Programming (1993) (5)
- SSG: a model-based development environment for smart, security-aware GUIs (2010) (5)
- Implementing Modal and Relevance Logics in a Logical Framework (1996) (5)
- From Nondeterministic to Multi-Head Deterministic Finite-State Transducers (2019) (4)
- Rippling Meta-Level Guidance for Mathematical Reasoning: Definitions of functions used in this book (2005) (4)
- Refining Authenticated Key Agreement with Strong Adversaries (2017) (4)
- Exploring Website Location as a Security Indicator (2016) (4)
- Obstruction-free Authorization Enforcement (2011) (4)
- Symbolic Probabilistic Analysis of Off-Line Guessing (2013) (4)
- Deciding safety and liveness in TPTL (2014) (4)
- Towards a Metalogic for Security Protocol Analysis (2004) (4)
- Generalized Rewriting in Type Theory (1994) (4)
- Authentication and Access Control (2011) (4)
- Two approaches to an information security laboratory (2008) (4)
- Midpoints Versus Endpoints: From Protocols to Firewalls (2007) (3)
- B2M: A Semantic Based Tool for BLIF Hardware Descriptions (2000) (3)
- ActionGUI semantics (2013) (3)
- A Formal Analysis of a Digital Signature Architecture (2003) (3)
- Specifying and Verifying Hysteresis Signature System with HOL-Z (2005) (3)
- A Formal Analysis of 5 G Authentication (2018) (3)
- Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009 (2009) (3)
- Runtime Verification over Out-of-order Streams (2019) (3)
- REVIEWS-Rippling: Meta-level guidance for mathematical reasoning (2006) (3)
- A Recipe for the Complexity Analysis of Non-Classical Logics (1998) (2)
- Symbolic Analysis of Identity-Based Protocols (2019) (2)
- IsaWhelk Interpreted in Isabelle (1994) (2)
- A Conservative Extension of First-order Logic and Its Application to Theorem Proving (1993) (2)
- From Natural Projection to Partial Model Checking and Back (2018) (2)
- A recursion planning analysis of inductive completion (1993) (2)
- Pests: Partial Evaluator Of Simple Transition Systems (2018) (2)
- Modal Specifications of Trace-Based Security Properties (2002) (2)
- IsaWhelk: Whelk interpreted in Isabelle (abstract) (1994) (2)
- Building Problem Solving Environments in Constructive Type Theory (1989) (2)
- Tests and Refutation (2017) (2)
- Synthesis of Programs in Computational Logi (2014) (2)
- Java bytecode verification by model checking : System abstract (1999) (2)
- Workshop on Theorem Proving with Analytic Tableaux and Related Methods, Marseille, France, 1993 (1993) (2)
- N-Tube: Formally Verified Secure Bandwidth Reservation in Path-Aware Internet Architectures (2022) (2)
- SSL / TLS Session-Aware User Authentication : A Lightweight Alternative to Client-Side Certificates (2007) (2)
- Proxy Certificates: The Missing Link in the Web's Chain of Trust (2019) (2)
- Practical Relational Calculus Query Evaluation (2022) (2)
- Development of a Network Topology Discovery Algorithm (2009) (2)
- Web Application Security (2011) (2)
- Theorem proving in higher order logics : 16 International Conference, TPHOLs 2003, Rome, Italy, September 8-12, 2003 : proceedings (2003) (2)
- Scoped metatheorems (1998) (2)
- Monitoring of temporal first-order properties with aggregations (2015) (2)
- Labelled Quantified Modal Logics (1997) (1)
- In-depth fuzz testing of IKE implementations (2011) (1)
- The AVISS Se urity Proto ol Analysis Tool ? (2002) (1)
- Formalizing and Analyzing Sender Invariance; ; Technical Report; (2006) (1)
- Dagstuhl Seminar 01391: Specification and Analysis of Secure Cryptographic Protocols (2001) (1)
- Checking System Compliance by Slicing and Monitoring Logs (2013) (1)
- An International Workshop on Competitions , Usability , Benchmarks , Evaluation , and Standardisation for Runtime Verification Tools The MonPoly Monitoring Tool (2017) (1)
- Browser Enhancements to Support SSL/TLS Session-Aware User Authentication (2006) (1)
- DPL: A Language for GDPR Enforcement (2022) (1)
- Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols (2022) (1)
- The Next 700 Synthesis Calculi (2002) (1)
- Verification of combinationallogic in Nuprl (1990) (1)
- Anchored LTL separation (2014) (1)
- Formal Methods in Computer-Aided Design, First International Conference, FMCAD '96, Palo Alto, California, USA (1996) (1)
- Algorithms for monitoring real-time properties (2017) (1)
- Constructing Mid-Points for Two-Party Asynchronous Protocols (2011) (1)
- Scalable offline monitoring of temporal specifications (2016) (1)
- Attack-preserving Security Protocol Transformations (2012) (1)
- Modeling Human Errors in Security Protocols ( Full Version ) (2016) (1)
- A Theory of Black-Box Tests (2020) (1)
- Proceedings of the Eleventh European Conference on Artificial Intelligence, Amsterdam, The Netherlands, August 8-12, 1994 (1994) (1)
- Formal Software Engineering (1996) (1)
- Protecting E-commerce Against the Man-In-The-Middle; ; Business communications review; (2007) (1)
- VeriMon: A Formally Verified Monitoring Tool (2022) (1)
- A formal data-model of the CORBA security service (2001) (1)
- {25 () Modeling a Hardware Synthesis Methodology in Isabelle (1996) (1)
- Semantic Vacuity (2015) (1)
- Induction Based on Rippling and Proof Planning Mini-Course (1994) (1)
- Technical Report No . 485 , Rev . 2 . 0 Algebraic Intruder Deductions ( Extended Version ) ? (2005) (1)
- Checking Websites’ GDPR Consent Compliance for Marketing Emails (2022) (1)
- Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version) (2022) (1)
- The Z Specification Language and the Proof Environment Isabelle/HOL-Z (2007) (1)
- Modal logics K, T, K4, S4: Labelled proof systems and new complexity results (1999) (1)
- 10th European Conference on Artificial Intelligence, ECAI 92, Vienna, Austria, August 3-7, 1992. Proceedings (1992) (1)
- Max-planck-institut F Ur Informatik Termination Orderings for Rippling K I N F O R M a T I K Im Stadtwald D 66123 Saarbr Ucken Germany Authors' Addresses Publication Notes (2013) (0)
- SECOND WORKSHOP ON LOGICAL FRAMEWORKS (1991) (0)
- Max-planck-institut F Ur Informatik Middle-out Reasoning for Logic Program Synthesis K I N F O R M a T I K Im Stadtwald D 66123 Saarbr Ucken Germany Authors' Addresses (2007) (0)
- Guaranteeing Correctnessthrough the Communication ofCheckable Proofs ( or : Would You Really Trust an Automated ReasoningSystem ? ) Xiaorong Huang Manfred KerberMichael Kohlhase Dan Nesmith (2007) (0)
- B2M: A Semanti Based Tool for BLIF Hardware Des riptions (2007) (0)
- FMSE'04 : proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering : Washington, DC, USA , October 29, 2004, co-located with CCS 2004 (2003) (0)
- Real-Time Policy Enforcement with Metric First-Order Temporal Logic (2022) (0)
- Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010 (2010) (0)
- Technology Transfer within the DEPLOY Project (2013) (0)
- Max-planck-institut for Informatik Authors' Addresses Publication Notes (2015) (0)
- University of Dundee A Formal Analysis of 5 G Authentication Basin (2018) (0)
- From rippling to a general methodology (2005) (0)
- Verifying Table-Based Elections (2021) (0)
- Formal Methods for Security Knowledge Area Version 1 . 0 . 0 (2021) (0)
- IFCIL: An Information Flow Configuration Language for SELinux (2022) (0)
- Max-planck-institut F Ur Informatik Metalogical Frameworks K I N F O R M a T I K Im Stadtwald D 66123 Saarbr Ucken Germany Authors' Addresses Publication Notes (2007) (0)
- Principles of Security and Trust (2013) (0)
- Proceedings of 1st ACM Workshop on Formal Methods in Security Engineering (FMSE) , affiliated with ACM CCS'03, Washington D.C. (2003) (0)
- Proceedings of the Second international conference on Principles of Security and Trust (2013) (0)
- Structuring Metatheory on Inductive Deenitions Supporting Documentation: a Machine-checked Transcript Available (1996) (0)
- Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System (2023) (0)
- C Proof of Theorem 4 . 1 a Proof of Theorem 3 . 1 (1994) (0)
- Beyond the finite in automatic hardware verification (1996) (0)
- Almost event-rate independent monitoring (2019) (0)
- A formal account of rippling (2005) (0)
- “I’m Surprised So Much Is Connected” (2022) (0)
- Chapter 22 Model Checking Security Protocols (2018) (0)
- Monitoring the Internet Computer (2023) (0)
- Link State Routing Development (2008) (0)
- Model Checking Security Protocols Draft Manuscript (2012) (0)
- Max-planck-institut F Ur Informatik a Recursion Planning Analysis of Inductive Completion K I N F O R M a T I K Im Stadtwald D 66123 Saarbr Ucken Germany Authors' Addresses Publication Notes (2008) (0)
- Rippling Meta-Level Guidance for Mathematical Reasoning: An introduction to rippling (2005) (0)
- FABRID: Flexible Attestation-Based Routing for Inter-Domain Networks (2023) (0)
- The hypercube and other hash-based partitioning schemes are sensitive to skew (2018) (0)
- SealClub: Computer-aided Paper Document Authentication (2022) (0)
- Bridging the semantic gap between qualitative and quantitative models of distributed systems (2022) (0)
- Rippling Meta-Level Guidance for Mathematical Reasoning: References (2005) (0)
- Max-planck-institut F ¨ Ur Informatik Metalogical Frameworks I N F O R M a T I K Authors' Addresses Publication Notes (2013) (0)
- Applied Deductive Verification (Dagstuhl Seminar 03451) (2021) (0)
- Certificates and Public Key Cryptography (2011) (0)
- Rippling Meta-Level Guidance for Mathematical Reasoning: Productive use of failure (2005) (0)
- Specifying Access Control in Event-B Thai (2009) (0)
- Technology Transfer (2013) (0)
- Preface (2022) (0)
- CryptHOL: Game-Based Proofs in Higher-Order Logic (2020) (0)
- Aknowledgments 5.3 Deducing in Ot via Reasoning in Mt (1994) (0)
- IsaNet: A framework for verifying secure data plane protocols (2022) (0)
- Local Arrangements Committee (2010) (0)
- Rippling Meta-Level Guidance for Mathematical Reasoning: The scope and limitations of rippling (2005) (0)
- Experience with FS 0 as (1991) (0)
- Controlling access to documents (2006) (0)
- Efficient Black-box Checking of Snapshot Isolation in Databases (2023) (0)
- Rippling Meta-Level Guidance for Mathematical Reasoning: An annotated calculus and a unification algorithm (2005) (0)
- Abstract Modeling of System Communication in Constructive Cryptography using CryptHOL (2021) (0)
- Current Trends in Logical Frameworks and Metalanguages (2001) (0)
- Session details: Logic programming based access control specification (2011) (0)
- Natural Projection as Partial Model Checking (2020) (0)
- Increasing the Efficiency of Next-Generation Space Operations by Exploiting Predictability (2009) (0)
- Efficient Evaluation of Arbitrary Relational Calculus Queries (2022) (0)
- Varieties of rippling (2005) (0)
- Interpretation of the Deductive Tableau in HOL (1995) (0)
- Edinburgh Research Explorer Middle-Out Reasoning for Logic Program Synthesis (2007) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With David A. Basin?
David A. Basin is affiliated with the following schools: