The AVISPA tool for the automated validation of internet security protocols and applications A Armando, D Basin, Y Boichut, Y Chevalier, L Compagna, J Cuéllar, ... Computer Aided Verification: 17th International Conference, CAV 2005 …, 2005 | 1618 | 2005 |
Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps A Armando, R Carbone, L Compagna, J Cuellar, L Tobarra Proceedings of the 6th ACM workshop on Formal methods in security …, 2008 | 403 | 2008 |
A high level protocol specification language for industrial security-sensitive protocols Y Chevalier, L Compagna, J Cuellar, PH Drielsma, J Mantovani, ... Workshop on Specification and Automated Processing of Security Requirements …, 2004 | 217 | 2004 |
Geopriv requirements J Cuellar, J Morris, D Mulligan, J Peterson, J Polk | 149 | 2004 |
Common policy: a document format for expressing privacy preferences H Schulzrinne, H Tschofenig, J Morris, J Cuellar, J Polk, J Rosenberg | 147 | 2007 |
The AVANTSSAR platform for the automated validation of trust and security of service-oriented architectures A Armando, W Arsac, T Avanesov, M Barletta, A Calvi, A Cappai, ... Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012 | 143 | 2012 |
Scalable RFID systems: a privacy-preserving protocol with constant-time identification B Alomair, A Clark, J Cuellar, R Poovendran IEEE Transactions on Parallel and Distributed Systems 23 (8), 1536-1550, 2011 | 120 | 2011 |
J. Polk," J Cuellar, J Morris, D Mulligan, J Peterson Geopriv Requirements", RFC 3693, 2004 | 120 | 2004 |
Toward a statistical framework for source anonymity in sensor networks B Alomair, A Clark, J Cuellar, R Poovendran IEEE Transactions on Mobile Computing 12 (2), 248-260, 2011 | 102 | 2011 |
An authentication flaw in browser-based single sign-on protocols: Impact and remediations A Armando, R Carbone, L Compagna, J Cuéllar, G Pellegrino, A Sorniotti Computers & Security 33, 41-58, 2013 | 99 | 2013 |
Avispa: automated validation of internet security protocols and applications A Armando, D Basin, J Cuellar, M Rusinowitch, L Viganò ERCIM News 64 (January), 66-69, 2006 | 85 | 2006 |
Method and system for verifying the authenticity of a first communication participants in a communications network J Cuellar, G Horn US Patent 6,980,796, 2005 | 62 | 2005 |
Statistical framework for source anonymity in sensor networks B Alomair, A Clark, J Cuellar, R Poovendran 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 55 | 2010 |
Use of a public key key pair in the terminal for authentication and authorization of the telecommunication user with the network operator and business partners J Cuellar, M Marhöfer US Patent 9,088,565, 2015 | 53 | 2015 |
Method and system for veryfying the authenticity of a first communication participants in a communications network J Cuellar, G Horn US Patent 8,565,429, 2013 | 53 | 2013 |
Method and system for verifying the authenticity of a first communication participants in a communications network J Cuellar, G Horn US Patent 7,139,550, 2006 | 52 | 2006 |
Secure smart contract generation based on petri nets N Zupan, P Kasinathan, J Cuellar, M Sauer Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed …, 2020 | 51 | 2020 |
Probabilistic receiver-location privacy protection in wireless sensor networks R Rios, J Cuellar, J Lopez Information Sciences 321, 205-223, 2015 | 49 | 2015 |
From multiple credentials to browser-based single sign-on: Are we more secure? A Armando, R Carbone, L Compagna, J Cuellar, G Pellegrino, A Sorniotti IFIP International Information Security Conference, 68-79, 2011 | 45 | 2011 |
Electronic distribution of airplane software and the impact of information security on airplane safety R Robinson, M Li, S Lintelman, K Sampigethaya, R Poovendran, ... International Conference on Computer Safety, Reliability, and Security, 28-39, 2007 | 45 | 2007 |