A comprehensive symbolic analysis of TLS 1.3 C Cremers, M Horvat, J Hoyland, S Scott, T van der Merwe Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 277 | 2017 |
Automated analysis and verification of TLS 1.3: 0-RTT, resumption and delayed authentication C Cremers, M Horvat, S Scott, T van der Merwe 2016 IEEE Symposium on Security and Privacy (SP), 470-485, 2016 | 152 | 2016 |
Testing cyber-physical systems through bayesian optimization J Deshmukh, M Horvat, X Jin, R Majumdar, VS Prabhu ACM Transactions on Embedded Computing Systems (TECS) 16 (5s), 1-18, 2017 | 79 | 2017 |
Improving the ISO/IEC 11770 standard for key management techniques C Cremers, M Horvat International Journal of Information Security 15 (6), 659-673, 2016 | 44 | 2016 |
Actor key compromise: Consequences and countermeasures D Basin, C Cremers, M Horvat 2014 IEEE 27th Computer Security Foundations Symposium, 244-258, 2014 | 18 | 2014 |
Computability of pseudo-cubes M Horvat, Z Iljazović, B Pažek Annals of Pure and Applied Logic 171 (8), 102823, 2020 | 11 | 2020 |
Computable subcontinua of semicomputable chainable Hausdorff continua V Čačić, M Horvat, Z Iljazović Theoretical Computer Science 892, 155-169, 2021 | 4 | 2021 |
Formal analysis of modern security protocols in current standards M Horvat University of Oxford, 2015 | 4 | 2015 |
Formal Security Analysis of the AMD SEV-SNP Software Interface P Paradžik, A Derek, M Horvat arXiv preprint arXiv:2403.10296, 2024 | | 2024 |
Rearranging absolutely convergent well-ordered series in Banach spaces V Čačić, M Doko, M Horvat Rad Hrvatske akademije znanosti i umjetnosti: Matematičke znanosti, 1-11, 2019 | | 2019 |