Luca Viganò
Luca Viganò
Professor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's College
Verified email at kcl.ac.uk - Homepage
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ...
International conference on computer aided verification, 281-285, 2005
12482005
OFMC: A symbolic model checker for security protocols
D Basin, S Mödersheim, L Vigano
International Journal of Information Security 4 (3), 181-208, 2005
5932005
Automated security protocol analysis with the AVISPA tool
L Vigano
Electronic Notes in Theoretical Computer Science 155, 61-86, 2006
3732006
An on-the-fly model-checker for security protocol analysis
D Basin, S Mödersheim, L Vigano
European Symposium on Research in Computer Security, 253-270, 2003
2332003
Labelled non-classical logics
L Vigano
Springer Science & Business Media, 2013
2072013
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction and …, 2012
1262012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
992002
Labelled propositional modal logics: Theory and practice
D Basin, S Matthews, L Vigano
Journal of Logic and Computation 7 (6), 685-717, 1997
911997
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
M Backes, S Mödersheim, B Pfitzmann, L Vigano
International Conference on Foundations of Software Science and Computation …, 2006
882006
Secure pseudonymous channels
S Mödersheim, L Viganò
European Symposium on Research in Computer Security, 337-354, 2009
872009
Natural deduction for non-classical logics
D Basin, S Matthews, L Viganò
Studia Logica 60 (1), 119-160, 1998
741998
The open-source fixed-point model checker for symbolic analysis of security protocols
S Mödersheim, L Vigano
Foundations of Security Analysis and Design V, 166-194, 2009
692009
CDiff: a new reduction technique for constraint-based analysis of security protocols
D Basin, S Mödersheim, L Vigano
Proceedings of the 10th ACM conference on Computer and communications …, 2003
552003
A formal approach to cyber-physical attacks
R Lanotte, M Merro, R Muradore, L Viganò
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 436-450, 2017
532017
On the semantics of Alice&Bob specifications of security protocols
C Caleiro, L Vigano, D Basin
Theoretical Computer Science 367 (1-2), 88-122, 2006
492006
Avispa: automated validation of internet security protocols and applications
A Armando, D Basin, J Cuellar, M Rusinowitch, L Viganò
ERCIM News 64 (January), 2006
482006
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
S Mödersheim, L Vigano, D Basin
Journal of Computer Security 18 (4), 575-618, 2010
422010
Model checking ad hoc network routing protocols: Aran vs. endaira
D Benetti, M Merro, L Vigano
2010 8th IEEE International Conference on Software Engineering and Formal …, 2010
412010
Algebraic intruder deductions
D Basin, S Mödersheim, L Vigano
International Conference on Logic for Programming Artificial Intelligence …, 2005
412005
Labelled modal logics: Quantifiers
D Basin, S Matthews, L Vigano
Journal of Logic, Language and Information 7 (3), 237-263, 1998
411998
The system can't perform the operation now. Try again later.
Articles 1–20