default search action
Muhammad Torabi Dashti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2017
- [j6]Karl Wüst, Petar Tsankov, Sasa Radomirovic, Mohammad Torabi Dashti:
Force Open: Lightweight black box file repair. Digit. Investig. 20 Supplement: S75-S82 (2017) - 2015
- [j5]Mahdi Asadpour, Mohammad Torabi Dashti:
Scalable, privacy preserving radio-frequency identification protocol for the internet of things. Concurr. Comput. Pract. Exp. 27(8): 1932-1950 (2015) - 2014
- [j4]Grgur Petric Maretic, Mohammad Torabi Dashti, David A. Basin:
LTL is closed under topological closure. Inf. Process. Lett. 114(8): 408-413 (2014) - 2012
- [j3]Anton Wijs, Mohammad Torabi Dashti:
Extended beam search for non-exhaustive state space analysis. J. Log. Algebraic Methods Program. 81(1): 46-69 (2012) - [j2]Mohammad Torabi Dashti:
Efficiency of optimistic fair exchange using trusted devices. ACM Trans. Auton. Adapt. Syst. 7(1): 3:1-3:18 (2012) - 2008
- [j1]Muhammad Torabi Dashti, Srijith Krishnan Nair, Hugo L. Jonker:
Nuovo DRM Paradiso: Designing a Secure, Verified, Fair Exchange DRM Scheme. Fundam. Informaticae 89(4): 393-417 (2008)
Conference and Workshop Papers
- 2017
- [c41]Mohammad Torabi Dashti, David A. Basin:
Tests and Refutation. ATVA 2017: 119-138 - [c40]Mohammad Torabi Dashti, Sasa Radomirovic:
An Anti-pattern for Misuse Cases. CyberICPS/SECPRE@ESORICS 2017: 250-261 - [c39]Marco Guarnieri, Petar Tsankov, Tristan Buchs, Mohammad Torabi Dashti, David A. Basin:
Test execution checkpointing for web applications. ISSTA 2017: 203-214 - 2016
- [c38]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Access Control Synthesis for Physical Spaces. CSF 2016: 443-457 - [c37]Mohammad Torabi Dashti, David A. Basin:
Security Testing Beyond Functional Tests. ESSoS 2016: 1-19 - 2015
- [c36]Sasa Radomirovic, Mohammad Torabi Dashti:
Derailing Attacks. Security Protocols Workshop 2015: 41-46 - [c35]Mohammad Torabi Dashti:
Derailing Attacks (Transcript of Discussion). Security Protocols Workshop 2015: 47-49 - [c34]Grgur Petric Maretic, Muhammad Torabi Dashti, David A. Basin:
Semantic Vacuity. TIME 2015: 111-120 - 2014
- [c33]Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin:
Fail-Secure Access Control. CCS 2014: 1157-1168 - [c32]Grgur Petric Maretic, Mohammad Torabi Dashti, David A. Basin:
Anchored LTL separation. CSL-LICS 2014: 74:1-74:9 - [c31]Petar Tsankov, Srdjan Marinovic, Mohammad Torabi Dashti, David A. Basin:
Decentralized Composite Access Control. POST 2014: 245-264 - [c30]Marco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti:
Model-Based Detection of CSRF. SEC 2014: 30-43 - 2013
- [c29]Abian Blome, Martín Ochoa, Keqin Li, Michele Peroli, Mohammad Torabi Dashti:
VERA: A Flexible Model-Based Vulnerability Testing Tool. ICST 2013: 471-478 - [c28]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Semi-valid input coverage for fuzz testing. ISSTA 2013: 56-66 - 2012
- [c27]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
SECFUZZ: Fuzz-testing security protocols. AST 2012: 1-7 - [c26]Simone Frau, Mohammad Torabi Dashti:
Analysis of Communicating Authorization Policies. STM 2012: 97-112 - [c25]Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Mödersheim, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - 2011
- [c24]Simone Frau, Mohammad Torabi Dashti:
Integrated Specification and Verification of Security Protocols and Policies. CSF 2011: 18-32 - [c23]Mohammad Torabi Dashti, Jan Cederquist, Yanjing Wang:
Risk Balance in Optimistic Non-repudiation Protocols. Formal Aspects in Security and Trust 2011: 263-277 - [c22]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Constructing Mid-Points for Two-Party Asynchronous Protocols. OPODIS 2011: 481-496 - [c21]Jan Cederquist, Mohammad Torabi Dashti:
Complexity of fairness constraints for the Dolev-Yao attacker model. SAC 2011: 1502-1509 - [c20]Mahdi Asadpour, Mohammad Torabi Dashti:
A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets. TrustCom 2011: 206-213 - 2010
- [c19]Wan J. Fokkink, Mohammad Torabi Dashti, Anton Wijs:
Partial Order Reduction for Branching Security Protocols. ACSD 2010: 191-200 - [c18]Bahareh Badban, Mohammad Torabi Dashti:
Semi-linear Parikh Images of Regular Expressions via Reduction. MFCS 2010: 653-664 - 2009
- [c17]Sjouke Mauw, Sasa Radomirovic, Mohammad Torabi Dashti:
Minimal Message Complexity of Asynchronous Multi-party Contract Signing. CSF 2009: 13-25 - [c16]Mohammad Torabi Dashti:
Optimistic Fair Exchange Using Trusted Devices. SSS 2009: 711-725 - 2008
- [c15]Simona Orzan, Muhammad Torabi Dashti:
Fair Exchange Is Incomparable to Consensus. ICTAC 2008: 349-363 - [c14]Simona Orzan, Muhammad Torabi Dashti:
Data Failures. DISC 2008: 514-515 - 2007
- [c13]Jan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw:
A Certified Email Protocol Using Key Chains. AINA Workshops (1) 2007: 525-530 - [c12]Muhammad Torabi Dashti, Yanjing Wang:
Risk Balance in Exchange Protocols. ASIAN 2007: 70-77 - [c11]Muhammad Torabi Dashti, Anton Wijs:
Pruning State Spaces with Extended Beam Search. ATVA 2007: 543-552 - [c10]Muhammad Torabi Dashti, Srijith Krishnan Nair, Hugo L. Jonker:
Nuovo DRM Paradiso: Towards a Verified Fair DRM Scheme. FSEN 2007: 33-48 - [c9]Srijith Krishnan Nair, Muhammad Torabi Dashti, Bruno Crispo, Andrew S. Tanenbaum:
A Hybrid PKI-IBC Based Ephemerizer System. SEC 2007: 241-252 - [c8]Stefan Blom, Jens R. Calamé, Bert Lisser, Simona Orzan, Jun Pang, Jaco van de Pol, Muhammad Torabi Dashti, Anton Wijs:
Distributed Analysis with mu CRL: A Compendium of Case Studies. TACAS 2007: 683-689 - [c7]Tom Chothia, Jun Pang, Muhammad Torabi Dashti:
Keeping Secrets in Resource Aware Components. QAPL 2007: 79-94 - [c6]Muhammad Torabi Dashti, Anton Wijs, Bert Lisser:
Distributed Partial Order Reduction for Security Protocols. PDMC@CAV 2007: 93-99 - 2006
- [c5]Jan Cederquist, Muhammad Torabi Dashti:
An intruder model for verifying liveness in security protocols. FMSE 2006: 23-32 - [c4]Tom Chothia, Simona Orzan, Jun Pang, Muhammad Torabi Dashti:
A Framework for Automatically Checking Anonymity with mu CRL. TGC 2006: 301-318 - 2005
- [c3]J. G. Cederquist, Ricardo Corin, Muhammad Torabi Dashti:
On the Quest for Impartiality: Design and Analysis of a Fair Non-repudiation Protocol. ICICS 2005: 27-39 - 2004
- [c2]Muhammad Torabi Dashti:
A fuzzy automaton for control applications. FUZZ-IEEE 2004: 505-509 - [c1]Jan Cederquist, Muhammad Torabi Dashti:
Formal Analysis of a Fair Payment Protocol. Formal Aspects in Security and Trust 2004: 41-54
Reference Works
- 2010
- [r1]Mohammad Torabi Dashti, Sjouke Mauw:
Fair Exchange. Handbook of Financial Cryptography and Security 2010: 109-132
Informal and Other Publications
- 2020
- [i3]Mohammad Torabi Dashti, David A. Basin:
A Theory of Black-Box Tests. CoRR abs/2006.10387 (2020) - 2016
- [i2]Petar Tsankov, Mohammad Torabi Dashti, David A. Basin:
Access Control Synthesis for Physical Spaces. CoRR abs/1605.01769 (2016) - 2009
- [i1]Muhammad Torabi Dashti:
Sums of powers via integration. CoRR abs/0903.4358 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint