Sebastian Alexander Mödersheim
Sebastian Alexander Mödersheim
Associate Professor of Computer Science, Denmark's Technical University
Verified email at - Homepage
Cited by
Cited by
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
Computer Security–ESORICS 2003, 253-270, 2003
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, P Hankes Drielsma, J Mantovani, ...
Proceedings of workshop on specification and automated processing of …, 2004
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification, 349-354, 2002
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
M Backes, S Mödersheim, B Pfitzmann, L Vigano
International Conference on Foundations of Software Science and Computation …, 2006
Secure pseudonymous channels
S Mödersheim, L Viganò
European Symposium on Research in Computer Security, 337-354, 2009
The open-source fixed-point model checker for symbolic analysis of security protocols
S Mödersheim, L Vigano
Foundations of Security Analysis and Design V, 166-194, 2009
Algebraic properties in alice and bob notation
S Mödersheim
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
CDiff: a new reduction technique for constraint-based analysis of security protocols
D Basin, S Mödersheim, L Vigano
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Abstraction by set-membership: verifying security protocols and web services with databases
SA Mödersheim
ACM Conference on Computer and Communications Security 17, 351-360, 2010
A card requirements language enabling privacy-preserving access control
J Camenisch, S Mödersheim, G Neven, FS Preiss, D Sommer
Proceeding of the 15th ACM symposium on Access control models and …, 2010
A formal model of identity mixer
J Camenisch, S Mödersheim, D Sommer
Formal Methods for Industrial Critical Systems, 198-214, 2010
ASLan++—a formal security specification language for distributed systems
D Von Oheimb, S Mödersheim
International Symposium on Formal Methods for Components and Objects, 1-22, 2010
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
S Mödersheim, L Vigano, D Basin
Journal of Computer Security 18 (4), 575-618, 2010
Algebraic intruder deductions
D Basin, S Mödersheim, L Vigano
Logic for Programming, Artificial Intelligence, and Reasoning, 549-564, 2005
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
Automated verification of virtualized infrastructures
S Bleikertz, T Groß, S Mödersheim
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 47-58, 2011
Vertical Protocol Composition
T Groß, S Mödersheim
24th IEEE Computer Security Foundations Workshop (CSF 2011), 2011
Integrating automated and interactive protocol verification
A Brucker, S Mödersheim
Formal Aspects in Security and Trust, 248-262, 2010
The system can't perform the operation now. Try again later.
Articles 1–20