Project-external papers and publications using the AVISPA Tool
and its technologies
- Massimo Benerecetti, Nicola Cuomo, and Adriano Peron.
Timed HLPSL for specification and verification of time
sensitive protocols. Proceedings of the Joint Workshop on
Foundations of Computer Security and Automated Reasoning for
Security Protocol Analysis (FCS-ARSPA'06), Seattle, August 15-16,
2006.
- Y. Glouche, T. Genet, O. Heen, and O. Courtay. A Security
Protocol Animator Tool for AVISPA. In ARTIST2 Workshop on
Security Specification and Verification of Embedded Systems, Pisa,
May 2006.
- Mureed Hussein and Dominique Seret. Extending TLS for trust
delegation in home networks. Proceedings of IEEE International
Conference on Advanced Communication Technology ICACT'06, pages
303-308, IEEE Computer Society, 2006.
- Mureed Hussein and Dominique Seret. A comparative Study of
Security Protocols Validation Tools: HERMES vs
AVISPA. Proceedings of IEEE International Conference on Advanced
Communication Technology ICACT'06, pages 497-502, IEEE Computer
Society, 2006.
- EU Project Ambient Networks (IST 507134) Deliverable
D-7-2: Ambient Network Security Architecture (Annexes II: Security
Requirements, Concepts and Solutions for Secure Access and
Mobility Procedures), December 2005. (URL:
http://www.ambient-networks.org/)
- Xiaoming Fu, Tseno Tsenov, Hannes Tschofenig, and Eckhart
Koerner. Advanced Authentication and Authorization for Quality
of Service Signaling Proceedings of the 1st IEEE/CreatNet
Workshop on Security and QoS in Communication Networks (SecQoS
2005), Athens, Greece, IEEE Computer Society Press, September
2005.
- Geir M. K�ien. Privacy enhanced cellular access
security. Proceedings of the 4th ACM workshop on Wireless
security, Cologne, Germany, pages: 57-66, 2005.
- Alexey Gotsman, Fabio Massacci, and Marco Pistore. Towards
an Independent Semantics and Verification Technology for the HLPSL
Specification Language. Electronic Notes in Theoretical
Computer Science, 135(1), pp. 59-77, 2005.
- Khaled Masmoudi, Mureed Hussein and Hossam Afifi and
Dominique Seret. Tri-party TLS adatation for trust delegation in
home networks. Proceedings of IEEE International Conference on
Security and Privacy, IEEE Computer Society, 2005.
- Simon Lukell and Andrew Hutchison. Selection of an
Attack-Construction Engine to Enhance Security Protocol
Analysis. Proceedings of the Southern African Telecommunication
Networks and Applications Conference (SATNAC) 2004, 2004.
- M. Mannan and P.C. van Oorschot. A Protocol for Secure
Public Instant Messaging. Proceedings of Financial Cryptography
and Data Security 2006, LNCS 3570, Springer, 2006.
- V. Narayanan, N. Venkitaraman, H. Tschofenig, G. Giaretta,
and J. Bournelle. Handover Keys Using AAA (Internet-Draft).
http://www.potaroo.net/ietf/idref/draft-vidya-mipshop-handover-keys-aaa,
2006.
- Graham Steel. Deduction with XOR Constraints in Security
API Modelling. Proceedings of CADE-20, LNCS 3632, pages
322-336, Springer, 2005.
- Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, Arthi
Nagarajan, and Murugaraj Shanmugam. Traversing Middleboxes with
the Host Identity Protocol. Proceedings of ACISP2005, LNCS
3574, pages 17-28, Springer, 2005.