Strand spaces: Proving security protocols correct FJT Fábrega, JC Herzog, JD Guttman Journal of computer security 7 (2/3), 191-230, 1999 | 947 | 1999 |
Strand spaces: Why is a security protocol correct? FJT Fábrega, JC Herzog, JD Guttman Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998 | 796 | 1998 |
Security for mobile agents: Authentication and state appraisal WM Farmer, JD Guttman, V Swarup Computer Security—ESORICS 96: 4th European Symposium on Research in …, 1996 | 426 | 1996 |
Security for mobile agents: Issues and requirements WM Farmer, JD Guttman, V Swarup Proceedings of the 19th national information systems security conference 2 …, 1996 | 388 | 1996 |
IMPS: An interactive mathematical proof system WM Farmer, JD Guttman, FJ Thayer Journal of Automated Reasoning 11, 213-248, 1993 | 304 | 1993 |
Principles of remote attestation G Coker, J Guttman, P Loscocco, A Herzog, J Millen, B O’Hanlon, ... International Journal of Information Security 10, 63-81, 2011 | 299 | 2011 |
Authentication tests and the structure of bundles JD Guttman, FJ Thayer Theoretical computer science 283 (2), 333-380, 2002 | 272 | 2002 |
Honest ideals on strand spaces FJT Fábrega, JC Herzog, JD Guttman Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No …, 1998 | 252 | 1998 |
Filtering postures: Local enforcement for global policies JD Guttman Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 247 | 1997 |
Little theories WM Farmer, JD Guttman, F Javier Thayer International Conference on Automated Deduction, 567-581, 1992 | 192 | 1992 |
Protocol independence through disjoint encryption JD Guttman, FJF Thayer Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 24-34, 2000 | 189 | 2000 |
Authentication tests JD Guttman, FJ Thayer Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 96-109, 2000 | 169 | 2000 |
Authentication for mobile agents S Berkovits, JD Guttman, V Swarup Mobile agents and security, 114-136, 1998 | 163 | 1998 |
Secure ad hoc trust initialization and key management in wireless body area networks M Li, S Yu, JD Guttman, W Lou, K Ren ACM Transactions on sensor Networks (TOSN) 9 (2), 1-35, 2013 | 149 | 2013 |
Verifying information flow goals in security-enhanced Linux JD Guttman, AL Herzog, JD Ramsdell, CW Skorupka Journal of Computer Security 13 (1), 115-134, 2005 | 127 | 2005 |
Security protocol design via authentication tests JD Guttman Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, 92-103, 2002 | 123 | 2002 |
Searching for shapes in cryptographic protocols SF Doghmi, JD Guttman, FJ Thayer International conference on tools and algorithms for the construction and …, 2007 | 116 | 2007 |
Rigorous automated network security management JD Guttman, AL Herzog International Journal of Information Security 4, 29-48, 2005 | 104 | 2005 |
VLISP: A verified implementation of Scheme JD Guttman, JD Ramsdell, M Wand Lisp and Symbolic Computation 8 (1), 5-32, 1995 | 96 | 1995 |
Trust management in strand spaces: A rely-guarantee method JD Guttman, FJ Thayer, JA Carlson, JC Herzog, JD Ramsdell, BT Sniffen European Symposium on Programming, 325-339, 2004 | 95 | 2004 |