Luca Vigan˛
Luca Vigan˛
Professor of Computer Science and Head of the Cybersecurity Group, Department of Informatics, King's
Verified email at kcl.ac.uk - Homepage
TitleCited byYear
The AVISPA tool for the automated validation of internet security protocols and applications
A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J CuÚllar, ...
International conference on computer aided verification, 281-285, 2005
10082005
OFMC: A symbolic model checker for security protocols
D Basin, S M÷dersheim, L Vigano
International Journal of Information Security 4 (3), 181-208, 2005
4982005
Automated security protocol analysis with the AVISPA tool
L Vigan˛
Electronic Notes in Theoretical Computer Science 155, 61-86, 2006
2622006
An on-the-fly model-checker for security protocol analysis
D Basin, S M÷dersheim, L Vigano
European Symposium on Research in Computer Security, 253-270, 2003
2212003
Labelled non-classical logics
L Vigano
Springer Science & Business Media, 2013
1802013
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures
A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ...
International Conference on Tools and Algorithms for the Construction andá…, 2012
1072012
The AVISS security protocol analysis tool
A Armando, D Basin, M Bouallagui, Y Chevalier, L Compagna, ...
International Conference on Computer Aided Verification, 349-354, 2002
982002
Labelled propositional modal logics: Theory and practice
D Basin, S Matthews, L Vigano
Journal of Logic and Computation 7 (6), 685-717, 1997
881997
Symbolic and cryptographic analysis of the secure WS-ReliableMessaging scenario
M Backes, S M÷dersheim, B Pfitzmann, L Vigano
International Conference on Foundations of Software Science and Computationá…, 2006
832006
Secure pseudonymous channels
S M÷dersheim, L Vigan˛
European Symposium on Research in Computer Security, 337-354, 2009
782009
Natural deduction for non-classical logics
D Basin, S Matthews, L Vigano
Studia Logica 60 (1), 119-160, 1998
721998
The open-source fixed-point model checker for symbolic analysis of security protocols
S M÷dersheim, L Vigan˛
Foundations of Security Analysis and Design V, 166-194, 2009
642009
CDiff: a new reduction technique for constraint-based analysis of security protocols
D Basin, S M÷dersheim, L Vigano
Proceedings of the 10th ACM conference on Computer and communicationsá…, 2003
532003
Labelled deduction
D Basin, M D'Agostino, DM Gabbay, S Matthews, L Vigan˛
Springer Science & Business Media, 2012
522012
On the semantics of Alice&Bob specifications of security protocols
C Caleiro, L Vigan˛, D Basin
Theoretical Computer Science 367 (1-2), 88-122, 2006
452006
Labelled modal logics: Quantifiers
D Basin, S Matthews, L Vigano
Journal of Logic, Language and Information 7 (3), 237-263, 1998
391998
Fibring labelled deduction systems
J Rasga, A Sernadas, C Sernadas, L Vigano
Journal of Logic and Computation 12 (3), 443-473, 2002
382002
Model checking ad hoc network routing protocols: Aran vs. endaira
D Benetti, M Merro, L Vigan
2010 8th IEEE International Conference on Software Engineering and Formalá…, 2010
372010
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
S M÷dersheim, L Vigano, D Basin
Journal of Computer Security 18 (4), 575-618, 2010
372010
Algebraic intruder deductions
D Basin, S M÷dersheim, L Vigano
International Conference on Logic for Programming Artificial Intelligenceá…, 2005
372005
The system can't perform the operation now. Try again later.
Articles 1–20