Follow
Luca Vigan˛
Luca Vigan˛
Professor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's College
Verified email at kcl.ac.uk - Homepage
Title
Cited by
Cited by
Year
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J CuÚllar, ...
International conference on computer aided verification, 281-285, 2005
14012005
OFMC: A symbolic model checker for security protocols
D Basin, S M÷dersheim, L Vigano
International Journal of Information Security 4 (3), 181-208, 2005
6322005
Automated security protocol analysis with the AVISPA tool
L Vigano
Electronic Notes in Theoretical Computer Science 155, 61-86, 2006
4362006
An on-the-fly model-checker for security protocol analysis
D Basin, S M÷dersheim, L Vigano
European Symposium on Research in Computer Security, 253-270, 2003
2392003
Labelled non-classical logics
L Vigano
Springer Science & Business Media, 2013
2212013
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction andá…, 2012
1322012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
1012002
Secure pseudonymous channels
S M÷dersheim, L Vigan˛
European Symposium on Research in Computer Security, 337-354, 2009
942009
Labelled propositional modal logics: Theory and practice
D Basin, S Matthews, L Vigano
Journal of Logic and Computation 7 (6), 685-717, 1997
931997
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
M Backes, S M÷dersheim, B Pfitzmann, L Vigano
International Conference on Foundations of Software Science and Computationá…, 2006
872006
The open-source fixed-point model checker for symbolic analysis of security protocols
S M÷dersheim, L Vigano
Foundations of Security Analysis and Design V, 166-194, 2009
802009
Natural deduction for non-classical logics
D Basin, S Matthews, L Vigan˛
Studia Logica 60 (1), 119-160, 1998
761998
CDiff: a new reduction technique for constraint-based analysis of security protocols
D Basin, S M÷dersheim, L Vigano
Proceedings of the 10th ACM conference on Computer and communicationsá…, 2003
582003
Avispa: automated validation of internet security protocols and applications
A Armando, D Basin, J Cuellar, M Rusinowitch, L Vigan˛
ERCIM News 64 (January), 2006
572006
Explainable security
L Vigano, D Magazzeni
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PWá…, 2020
562020
A formal approach to cyber-physical attacks
R Lanotte, M Merro, R Muradore, L Vigan˛
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 436-450, 2017
542017
Conditional simple temporal networks with uncertainty and decisions
M Zavatteri, L Vigan˛
Theoretical Computer Science 797, 77-101, 2019
482019
On the semantics of Alice&Bob specifications of security protocols
C Caleiro, L Vigano, D Basin
Theoretical Computer Science 367 (1-2), 88-122, 2006
482006
Algebraic intruder deductions
D Basin, S M÷dersheim, L Vigano
International Conference on Logic for Programming Artificial Intelligenceá…, 2005
472005
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
S M÷dersheim, L Vigano, D Basin
Journal of Computer Security 18 (4), 575-618, 2010
452010
The system can't perform the operation now. Try again later.
Articles 1–20