Designing intrusion detection to detect black hole and selective forwarding attack in WSN based on local information M Tiwari, KV Arya, R Choudhari, KS Choudhary 2009 Fourth International Conference on Computer Sciences and Convergence …, 2009 | 90 | 2009 |
Verifpal: Cryptographic Protocol Analysis for the Real World N Kobeissi, G Nicolas, M Tiwari International Conference on Cryptology in India, 151-202, 2020 | 45 | 2020 |
Verified verifiers for verifying elections T Haines, R Goré, M Tiwari Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 17 | 2019 |
Modular formalisation and verification of STV algorithms MK Ghale, R Goré, D Pattinson, M Tiwari Electronic Voting: Third International Joint Conference, E-Vote-ID 2018 …, 2018 | 12 | 2018 |
Verifiable homomorphic tallying for the Schulze vote counting scheme T Haines, D Pattinson, M Tiwari Verified Software. Theories, Tools, and Experiments: 11th International …, 2020 | 9 | 2020 |
Schulze voting as evidence carrying computation D Pattinson, M Tiwari Interactive Theorem Proving: 8th International Conference, ITP 2017 …, 2017 | 8 | 2017 |
Verifpal: Cryptographic Protocol Analysis for Students and Engineers. N Kobeissi IACR Cryptol. ePrint Arch. 2019, 971, 2019 | 6 | 2019 |
Verifpal: Cryptographic Protocol Analysis for Students and Engineers. N Kobeissi IACR Cryptol. ePrint Arch. 2019, 971, 2019 | 6 | 2019 |
No more excuses: Automated synthesis of practical and verifiable vote-counting programs for complex voting schemes L Bennett Moses, R Goré, R Levy, D Pattinson, M Tiwari Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017 | 5 | 2017 |
Verifpal N Kobeissi, G Nicolas, M Tiwari Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security …, 2020 | 2 | 2020 |
Performance Evaluation of SCTP-Sec: A Secure SCTP Mechanism R Choudhari, KV Arya, M Tiwari, KS Choudhary 2009 Fourth International Conference on Computer Sciences and Convergence …, 2009 | 2 | 2009 |
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version) T Murray, M Tiwari, G Ernst, DA Naumann arXiv preprint arXiv:2309.03442, 2023 | 1 | 2023 |
Machine Checked Properties of the Schulze Method M Tiwari, D Pattinson 7th Workshop on Hot Issues in Security Principles and Trust, 2021 | 1 | 2021 |
Formally Verified Verifiable Electronic Voting Scheme M Tiwari PQDT-Global, 2021 | 1 | 2021 |
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications T Murray, M Tiwari, G Ernst, DA Naumann Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | | 2023 |
Machine-checking {Multi-Round} Proofs of Shuffle:{Terelius-Wikstrom} and {Bayer-Groth} T Haines, R Goré, M Tiwari 32nd USENIX Security Symposium (USENIX Security 23), 6471-6488, 2023 | | 2023 |
Verifying the Security of a PGP Keyserver (Abstract for the VerifyThis challenge 2020) G Ernst, T Murray, M Tiwari Submitted and Presented Solutions (Online Presentation, 27 April 2020), 14, 2020 | | 2020 |
PI in Cryptography M Tiwari | | |