Sebastian Alexander Mödersheim
Sebastian Alexander Mödersheim
Associate Professor of Computer Science, Denmark's Technical University
Verified email at - Homepage
Cited by
Cited by
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
Computer Security–ESORICS 2003, 253-270, 2003
A high level protocol specification language for industrial security-sensitive protocols
Y Chevalier, L Compagna, J Cuellar, P Hankes Drielsma, J Mantovani, ...
Proceedings of workshop on specification and automated processing of …, 2004
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
Computer Aided Verification, 349-354, 2002
Secure pseudonymous channels
S Mödersheim, L Viganò
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
The open-source fixed-point model checker for symbolic analysis of security protocols
S Mödersheim, L Vigano
International School on Foundations of Security Analysis and Design, 166-194, 2007
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
M Backes, S Mödersheim, B Pfitzmann, L Vigano
International Conference on Foundations of Software Science and Computation …, 2006
Algebraic properties in alice and bob notation
S Mödersheim
Availability, Reliability and Security, 2009. ARES'09. International …, 2009
CDiff: a new reduction technique for constraint-based analysis of security protocols
D Basin, S Mödersheim, L Vigano
Proceedings of the 10th ACM conference on Computer and communications …, 2003
A formal model of identity mixer
J Camenisch, S Mödersheim, D Sommer
Formal Methods for Industrial Critical Systems, 198-214, 2010
Abstraction by set-membership: verifying security protocols and web services with databases
SA Mödersheim
ACM Conference on Computer and Communications Security 17, 351-360, 2010
Proactive security analysis of changes in virtualized infrastructures
S Bleikertz, C Vogel, T Groß, S Mödersheim
Proceedings of the 31st annual computer security applications conference, 51-60, 2015
A card requirements language enabling privacy-preserving access control
J Camenisch, S Mödersheim, G Neven, FS Preiss, D Sommer
Proceeding of the 15th ACM symposium on Access control models and …, 2010
Algebraic intruder deductions
D Basin, S Mödersheim, L Vigano
Logic for Programming, Artificial Intelligence, and Reasoning, 549-564, 2005
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
S Mödersheim, L Vigano, D Basin
Journal of Computer Security 18 (4), 575-618, 2010
ASLan++—a formal security specification language for distributed systems
D Von Oheimb, S Mödersheim
Formal Methods for Components and Objects: 9th International Symposium, FMCO …, 2012
Avispa v1. 1 user manual
TA Team
Information society technologies programme (June 2006), http://avispa …, 2006
Vertical Protocol Composition
T Groß, S Mödersheim
24th IEEE Computer Security Foundations Workshop (CSF 2011), 2011
Automated verification of virtualized infrastructures
S Bleikertz, T Groß, S Mödersheim
Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 47-58, 2011
The system can't perform the operation now. Try again later.
Articles 1–20