Joshua D. Guttman
Orcid: 0000-0002-7189-1758Affiliations:
- The MITRE Corporation, Bedford, MA, USA
- Worcester Polytechnic Institute, MA, USA
According to our database1,
Joshua D. Guttman
authored at least 90 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on andrej.com
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
2023
2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
Proceedings of the Logic, 2020
2019
Proceedings of the Security and Trust Management - 15th International Workshop, 2019
Proceedings of the Foundations of Security, Protocols, and Equational Reasoning, 2019
2018
Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA.
Proceedings of the Integrated Formal Methods - 14th International Conference, 2018
2017
Proceedings of the Concurrency, Security, and Puzzles, 2017
2016
Proceedings of the Security Standardisation Research - Third International Conference, 2016
Proceedings of the IEEE 29th Computer Security Foundations Symposium, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the Programming Languages with Applications to Biology and Security, 2015
2014
Proceedings of the Security Standardisation Research - First International Conference, 2014
Proceedings of the Integrated Formal Methods - 11th International Conference, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
Secure ad hoc trust initialization and key management in wireless body area networks.
ACM Trans. Sens. Networks, 2013
Chorus: scalable in-band trust establishment for multiple constrained devices over the insecure wireless channel.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the Principles of Security and Trust - Second International Conference, 2013
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
2012
Proceedings of the Trustworthy Global Computing - 7th International Symposium, 2012
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
2011
Proceedings of the Theory of Security and Applications - Joint Workshop, 2011
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011
2010
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010
2009
Proceedings of the Proceedings Second International Workshop on Programming Language Approaches to Concurrency and Communication-cEntric Software, 2009
Proceedings of the Proceedings 2nd Interaction and Concurrency Experience: Structured Interactions, 2009
Proceedings of the Proceedings 16th International Workshop on Expressiveness in Concurrency, 2009
Proceedings of the Proceedings 7th International Workshop on Security Issues in Concurrency, 2009
Proceedings of the Foundations and Applications of Security Analysis, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information and Communications Security, 10th International Conference, 2008
2007
Proceedings of the 23rd Conference on the Mathematical Foundations of Programming Semantics, 2007
Proceedings of the 16th International Conference on World Wide Web, 2007
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2007
Proceedings of the Advances in Computer Science, 2007
2006
IACR Cryptol. ePrint Arch., 2006
2005
Proceedings of the Trustworthy Global Computing, International Symposium, 2005
2004
J. Comput. Secur., 2004
Authentication tests and disjoint encryption: A design method for security protocols.
J. Comput. Secur., 2004
A New Column: Information Security.
Bull. EATCS, 2004
Proceedings of the Programming Languages and Systems, 2004
2003
2002
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002
2001
Proceedings of the Seventeenth Conference on the Mathematical Foundations of Programming Semantics, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
Proceedings of the Foundations of Security Analysis and Design, 2000
Proceedings of the Computer Security, 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
1998
Proceedings of the Security and Privacy, 1998
Proceedings of the Mobile Agents and Security, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
1996
Proceedings of the Computer Security, 1996
Proceedings of the Automated Deduction - CADE-13, 13th International Conference on Automated Deduction, New Brunswick, NJ, USA, July 30, 1996
1995
VLISP: A Verified Implementation of Scheme.
LISP Symb. Comput., 1995
The VLISP Verified Scheme System.
LISP Symb. Comput., 1995
1994
Proceedings of the FME '94: Industrial Benefit of Formal Methods, 1994
Proceedings of the Automated Deduction - CADE-12, 12th International Conference on Automated Deduction, Nancy, France, June 26, 1994
1993
Proceedings of the Design and Implementation of Symbolic Computation Systems, 1993
1992
Panel: Use of Formal Methods in the Analysis of Cryptographic Protocols.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
1988
What Needs Securing.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988
1987
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987