Project-external papers and publications using the AVISPA Tool and its technologies

  1. Massimo Benerecetti, Nicola Cuomo, and Adriano Peron. Timed HLPSL for specification and verification of time sensitive protocols. Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06), Seattle, August 15-16, 2006.

  2. Y. Glouche, T. Genet, O. Heen, and O. Courtay. A Security Protocol Animator Tool for AVISPA. In ARTIST2 Workshop on Security Specification and Verification of Embedded Systems, Pisa, May 2006.

  3. Mureed Hussein and Dominique Seret. Extending TLS for trust delegation in home networks. Proceedings of IEEE International Conference on Advanced Communication Technology ICACT'06, pages 303-308, IEEE Computer Society, 2006.

  4. Mureed Hussein and Dominique Seret. A comparative Study of Security Protocols Validation Tools: HERMES vs AVISPA. Proceedings of IEEE International Conference on Advanced Communication Technology ICACT'06, pages 497-502, IEEE Computer Society, 2006.

  5. EU Project Ambient Networks (IST 507134) Deliverable D-7-2: Ambient Network Security Architecture (Annexes II: Security Requirements, Concepts and Solutions for Secure Access and Mobility Procedures), December 2005. (URL: http://www.ambient-networks.org/)

  6. Xiaoming Fu, Tseno Tsenov, Hannes Tschofenig, and Eckhart Koerner. Advanced Authentication and Authorization for Quality of Service Signaling Proceedings of the 1st IEEE/CreatNet Workshop on Security and QoS in Communication Networks (SecQoS 2005), Athens, Greece, IEEE Computer Society Press, September 2005.

  7. Geir M. K�ien. Privacy enhanced cellular access security. Proceedings of the 4th ACM workshop on Wireless security, Cologne, Germany, pages: 57-66, 2005.

  8. Alexey Gotsman, Fabio Massacci, and Marco Pistore. Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language. Electronic Notes in Theoretical Computer Science, 135(1), pp. 59-77, 2005.

  9. Khaled Masmoudi, Mureed Hussein and Hossam Afifi and Dominique Seret. Tri-party TLS adatation for trust delegation in home networks. Proceedings of IEEE International Conference on Security and Privacy, IEEE Computer Society, 2005.

  10. Simon Lukell and Andrew Hutchison. Selection of an Attack-Construction Engine to Enhance Security Protocol Analysis. Proceedings of the Southern African Telecommunication Networks and Applications Conference (SATNAC) 2004, 2004.

  11. M. Mannan and P.C. van Oorschot. A Protocol for Secure Public Instant Messaging. Proceedings of Financial Cryptography and Data Security 2006, LNCS 3570, Springer, 2006.

  12. V. Narayanan, N. Venkitaraman, H. Tschofenig, G. Giaretta, and J. Bournelle. Handover Keys Using AAA (Internet-Draft). http://www.potaroo.net/ietf/idref/draft-vidya-mipshop-handover-keys-aaa, 2006.

  13. Graham Steel. Deduction with XOR Constraints in Security API Modelling. Proceedings of CADE-20, LNCS 3632, pages 322-336, Springer, 2005.

  14. Hannes Tschofenig, Andrei Gurtov, Jukka Ylitalo, Arthi Nagarajan, and Murugaraj Shanmugam. Traversing Middleboxes with the Host Identity Protocol. Proceedings of ACISP2005, LNCS 3574, pages 17-28, Springer, 2005.