Tajana Ban Kirigin
Tajana Ban Kirigin
University of Rijeka, Department of Mathematics
Potvrđena adresa e-pošte na math.uniri.hr
Naslov
Citirano
Citirano
Godina
Bounded memory Dolev-Yao adversaries in collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Information and computation, Special issue on Security and Rewriting …, 2014
172014
A Rewriting Framework for Activities Subject to Regulations.
MI Kanovich, T Ban Kirigin, V Nigam, A Scedrov, CL Talcott, R Perovic
RTA 15, 305-322, 2012
162012
Discrete vs. Dense Times in the Analysis of Cyber-Physical Security Protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
4th Conference on Principles of Security and Trust (POST), Springer LNCS …, 2015
132015
Time, computational complexity, and probability in the analysis of distance-bounding protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Journal of Computer Security 25 (6), 585-630, 2017
112017
Bounded memory Dolev-Yao adversaries in collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Formal Aspects of Security and Trust, 18-33, 2011
112011
Towards Timed Models for Cyber-Physical Security Protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Joint Workshop on Foundations of Computer Security and Formal and …, 2014
102014
Bounded memory protocols and progressing collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Computer Security–ESORICS 2013, Springer LNCS 8134, 309-326, 2013
102013
Progressing collaborative systems
M Kanovich, TB Kirigin, V Nigam, A Scedrov
Advances in computer science: an international journal 3 (3), 78-86, 2014
9*2014
Progressing collaborative systems
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Workshop on Foundations of Security and Privacy (FCS-PrivMod 2010), 2010
92010
A rewriting framework and logic for activities subject to regulations
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott, R Perovic
Mathematical Structures in Computer Science, 2015
82015
Towards an automated assistant for clinical investigations
V Nigam, T Ban Kirigin, A Scedrov, C Talcott, M Kanovich, R Perovic
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
82012
Statistical model checking of distance fraud attacks on the Hancke-Kuhn family of protocols
MA Alturki, M Kanovich, T Ban Kirigin, V Nigam, A Scedrov, C Talcott
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and …, 2018
62018
Bounded Memory Protocols
M Kanovich, T Ban Kirigin, V Nigam, A Scedrov
Computer languages systems & structures (1477-8424) 40 (3-4), 137-154, 2014
62014
Timed multiset rewriting and the verification of time-sensitive distributed systems
M Kanovich, TB Kirigin, V Nigam, A Scedrov, C Talcott
International Conference on Formal Modeling and Analysis of Timed Systems …, 2016
52016
Euklidski prostori
M Polonijo, D Crnkovic, TB Kirigin, M Bombardelli, Z Franusic, R Susanj
52008
A multiset rewriting model for specifying and verifying timing aspects of security protocols
MA Alturki, TB Kirigin, M Kanovich, V Nigam, A Scedrov, C Talcott
Foundations of Security, Protocols, and Equational Reasoning, 192-213, 2019
42019
Can we mitigate the attacks on Distance-Bounding Protocols by using challenge-response rounds repeatedly?
M Kanovich, TB Kirigin, V Nigam, A Scedrov, C Talcott
Workshop on Foundations of Computer Security 2016, 2016
42016
Resource-Bounded Intruders in Denial of Service Attacks
AA Urquiza, MA AlTurki, M Kanovich, TB Kirigin, V Nigam, A Scedrov, ...
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 382-38214, 2019
32019
Compliance in real time multiset rewriting models
M Kanovich, TB Kirigin, V Nigam, A Scedrov, C Talcott
arXiv preprint arXiv:1811.04826, 2018
32018
Towards a formal model of language networks
TB Kirigin, A Meštrović, S Martinčić-Ipšić
International Conference on Information and Software Technologies, 469-479, 2015
32015
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20