


default search action
Iliano Cervesato
- > Home > Persons > Iliano Cervesato
Publications
- 2018
- [j23]Iliano Cervesato, Kaustuv Chaudhuri:
Preface - Special Issue on Logical Frameworks and Meta-Languages 2015. Math. Struct. Comput. Sci. 28(9): 1506 (2018) - [c57]Iliano Cervesato, Sharjeel Khan
, Giselle Reis, Dragisa Zunic
:
Formalization of Automated Trading Systems in a Concurrent Linear Framework. Linearity-TLLA@FLoC 2018: 1-14 - 2016
- [j22]Yuxin Deng, Robert J. Simmons, Iliano Cervesato:
Relating reasoning methodologies in linear logic and process algebra. Math. Struct. Comput. Sci. 26(5): 868-906 (2016) - 2015
- [e4]Iliano Cervesato, Kaustuv Chaudhuri:
Proceedings Tenth International Workshop on Logical Frameworks and Meta Languages: Theory and Practice, LFMTP 2015, Berlin, Germany, 1 August 2015. EPTCS 185, 2015 [contents] - [e3]Iliano Cervesato, Carsten Schürmann:
Proceedings First International Workshop on Focusing, WoF 2015, Suva, Fiji, 23rd November 2015. EPTCS 197, 2015 [contents] - 2012
- [c42]Yuxin Deng, Iliano Cervesato, Robert J. Simmons:
Relating Reasoning Methodologies in Linear Logic and Process Algebra. LINEARITY 2012: 50-60 - 2011
- [j17]Michael Backes, Iliano Cervesato
, Aaron D. Jaggard
, Andre Scedrov
, Joe-Kai Tsay:
Cryptographically sound security proofs for basic and public-key Kerberos. Int. J. Inf. Sec. 10(2): 107-134 (2011) - 2009
- [j16]Iliano Cervesato
, Andre Scedrov
:
Relating state-based and process-based concurrency through linear logic (full-version). Inf. Comput. 207(10): 1044-1077 (2009) - 2008
- [j15]Iliano Cervesato
, Aaron D. Jaggard
, Andre Scedrov
, Joe-Kai Tsay, Christopher Walstad:
Breaking and fixing public-key Kerberos. Inf. Comput. 206(2-4): 402-424 (2008) - 2007
- [j13]Iliano Cervesato
, Mark-Oliver Stehr:
Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types. High. Order Symb. Comput. 20(1-2): 3-35 (2007) - [j12]Iliano Cervesato
, Catherine Meadows:
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. IEEE Trans. Dependable Secur. Comput. 4(3): 216-227 (2007) - 2006
- [j11]Frederick Butler, Iliano Cervesato
, Aaron D. Jaggard
, Andre Scedrov
, Christopher Walstad:
Formal analysis of Kerberos 5. Theor. Comput. Sci. 367(1-2): 57-87 (2006) - [c37]Iliano Cervesato
, Aaron D. Jaggard
, Andre Scedrov
, Joe-Kai Tsay, Christopher Walstad:
Breaking and Fixing Public-Key Kerberos. ASIAN 2006: 167-181 - [c36]Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. ESORICS 2006: 362-383 - [c35]Iliano Cervesato
, Andre Scedrov
:
Relating State-Based and Process-Based Concurrency through Linear Logic. WoLLIC 2006: 145-176 - [i2]Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad:
Breaking and Fixing Public-Key Kerberos. IACR Cryptol. ePrint Arch. 2006: 9 (2006) - [i1]Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. IACR Cryptol. ePrint Arch. 2006: 219 (2006) - 2005
- [j10]Serge Autexier
, Iliano Cervesato
, Heiko Mantel:
Preface to the special issue of selected papers from FCS/VERIFY 2002. Int. J. Inf. Sec. 4(1-2): 1 (2005) - [j8]Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln:
A comparison between strand spaces and multiset rewriting for security protocol analysis. J. Comput. Secur. 13(2): 265-316 (2005) - [c34]Iliano Cervesato, Catherine Meadows, Dusko Pavlovic:
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. CSFW 2005: 48-61 - [c33]Iliano Cervesato
, Aaron D. Jaggard
, Andre Scedrov
, Christopher Walstad:
Specifying Kerberos 5 cross-realm authentication. WITS 2005: 12-26 - 2004
- [j7]Catherine Meadows, Paul F. Syverson, Iliano Cervesato:
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. J. Comput. Secur. 12(6): 893-931 (2004) - [c32]Kevin Watkins, Iliano Cervesato
, Frank Pfenning, David Walker
:
Specifying Properties of Concurrent Computations in CLF. LFM@IJCAR 2004: 67-87 - [c31]Iliano Cervesato
, Mark-Oliver Stehr:
Representing the MSR Cryptoprotocol Specification Language in an Extension of Rewriting Logic with Dependent Types. WRLA 2004: 183-207 - 2003
- [j6]Iliano Cervesato
, Frank Pfenning:
A Linear Spine Calculus. J. Log. Comput. 13(5): 639-688 (2003) - [c29]Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov:
Verifying Confidentiality and Authentication in Kerberos 5. ISSS 2003: 1-24 - [c27]Kevin Watkins, Iliano Cervesato, Frank Pfenning, David Walker:
A Concurrent Logical Framework: The Propositional Fragment. TYPES 2003: 355-377 - 2002
- [j5]Iliano Cervesato
, Frank Pfenning:
A Linear Logical Framework. Inf. Comput. 179(1): 19-75 (2002) - [c26]Frederick Butler, Iliano Cervesato, Aaron D. Jaggard
, Andre Scedrov
:
A Formal Analysis of Some Properties of Kerberos 5 Using MSR. CSFW 2002: 175- - [c25]Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov:
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis. ISSS 2002: 356-383 - 2000
- [j3]Iliano Cervesato, Joshua S. Hodas, Frank Pfenning:
Efficient resource management for linear logic proof search. Theor. Comput. Sci. 232(1-2): 133-163 (2000) - [c22]Iliano Cervesato, Nancy A. Durgin, John C. Mitchell, Patrick Lincoln, Andre Scedrov:
Relating Strands and Multiset Rewriting for Security Protocol Analysis. CSFW 2000: 35-51 - [c21]Paul F. Syverson, Iliano Cervesato:
The Logic of Authentication Protocols. FOSAD 2000: 63-136 - 1999
- [c18]Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov:
A Meta-Notation for Protocol Analysis. CSFW 1999: 55-69 - 1997
- [c13]Iliano Cervesato, Frank Pfenning:
Linear Higher-Order Pre-Unification. LICS 1997: 422-433 - 1996
- [c10]Iliano Cervesato, Joshua S. Hodas, Frank Pfenning:
Efficient Resource Management for Linear Logic Proof Search. ELP 1996: 67-81 - [c9]Iliano Cervesato, Frank Pfenning:
A Linear Logical Framework. LICS 1996: 264-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-02 19:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint
