Sebastian Mödersheim
Orcid: 0000-0002-6901-8319Affiliations:
- Technical University of Denmark
According to our database1,
Sebastian Mödersheim
authored at least 64 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the Open Identity Summit 2024, Porto, Portugal, June 20-21, 2024, 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Proceedings of the Open Identity Summit 2023, Heilbronn, Germany, June 15-16, 2023, 2023
2022
Proceedings of the Rewriting Logic and Its Applications - 14th International Workshop, 2022
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022
2021
Sensors, 2021
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark, June 1-2, 2021., 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the Protocols, Strands, and Logic, 2021
Proceedings of the Protocols, Strands, and Logic, 2021
2020
Proceedings of the Open Identity Summit 2020, 26-27 May, 2020, Copenhagen, Denmark., 2020
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020
2019
Proceedings of the Open Identity Summit 2019, 2019
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy.
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018
2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
2016
J. Inf. Secur. Appl., 2016
Proceedings of the Principles of Security and Trust - 5th International Conference, 2016
2015
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment.
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015
Proceedings of the Programming Languages with Applications to Biology and Security, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
Proceedings of the Principles of Security and Trust - Second International Conference, 2013
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs.
Proceedings of the Secure IT Systems - 18th Nordic Conference, 2013
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2013
2012
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011
Proceedings of the Future Internet, 2011
Proceedings of the 24th IEEE Computer Security Foundations Symposium, 2011
Proceedings of the 3rd ACM Cloud Computing Security Workshop, 2011
2010
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols.
J. Comput. Secur., 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the Formal Methods for Industrial Critical Systems, 2010
Proceedings of the Formal Methods for Components and Objects - 9th International Symposium, 2010
Abstraction by set-membership: verifying security protocols and web services with databases.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols.
Proceedings of the Foundations of Security Analysis and Design V, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
2007
PhD thesis, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006
2005
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005
2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Proceedings of the Logic for Programming, 2004
2003
Proceedings of the Computer Security, 2003
CDiff: a new reduction technique for constraint-based analysis of security protocols.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the Computer Aided Verification, 14th International Conference, 2002
2000
Proceedings of the Formal Methods in Computer-Aided Design, Third International Conference, 2000