default search action
Sebastian Mödersheim
Person information
- affiliation: Technical University of Denmark
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c54]Laouen Fernet, Sebastian Mödersheim, Luca Viganò:
A Decision Procedure for Alpha-Beta Privacy for a Bounded Number of Transitions. CSF 2024: 17-32 - [c53]Sebastian Mödersheim, Siyu Chen:
Accountable Banking Transactions. Open Identity Summit 2024: 51-60 - 2023
- [j10]Andreas V. Hess, Sebastian Alexander Mödersheim, Achim D. Brucker:
Stateful Protocol Composition in Isabelle/HOL. ACM Trans. Priv. Secur. 26(3): 25:1-25:36 (2023) - [c52]Laouen Fernet, Sebastian Mödersheim:
Private Authentication with Alpha-Beta Privacy. Open Identity Summit 2023 - 2022
- [c51]Sébastien Gondron, Sebastian Mödersheim, Luca Viganò:
Privacy as Reachability. CSF 2022: 130-146 - [c50]Sebastian Mödersheim:
Rewriting Privacy. WRLA@ETAPS 2022: 22-41 - [e5]Heiko Roßnagel, Christian H. Schunck, Sebastian Mödersheim:
Open Identity Summit 2022, Copenhagen, Denmark, July 7-8, 2022. LNI P-325, Gesellschaft für Informatik e.V. 2022, ISBN 978-3-88579-719-7 [contents] - 2021
- [j9]Koen Tange, Sebastian Mödersheim, Apostolos Lalos, Xenofon Fafoutis, Nicola Dragoni:
rTLS: Secure and Efficient TLS Session Resumption for the Internet of Things. Sensors 21(19): 6524 (2021) - [c49]Alessandro Bruni, Marco Carbone, Rosario Giustolisi, Sebastian Mödersheim, Carsten Schürmann:
Security Protocols as Choreographies. Protocols, Strands, and Logic 2021: 98-111 - [c48]Sebastian Mödersheim, Jorge Cuéllar:
Three Branches of Accountability. Protocols, Strands, and Logic 2021: 293-311 - [c47]Sébastien Gondron, Sebastian Mödersheim:
Vertical Composition and Sound Payload Abstraction for Stateful Protocols. CSF 2021: 1-16 - [c46]Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker, Anders Schlichtkrull:
Performing Security Proofs of Stateful Protocols. CSF 2021: 1-16 - [c45]Lukas Alber, Stefan More, Sebastian Mödersheim, Anders Schlichtkrull:
Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World. Open Identity Summit 2021: 107-118 - [c44]Laouen Fernet, Sebastian Mödersheim:
Deciding a Fragment of (α , β )-Privacy. STM 2021: 122-142 - [e4]Daniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim, Paul D. Rowe:
Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday. Lecture Notes in Computer Science 13066, Springer 2021, ISBN 978-3-030-91630-5 [contents] - [e3]Heiko Roßnagel, Christian H. Schunck, Sebastian Mödersheim:
Open Identity Summit 2021, Copenhagen, Denmark, June 1-2, 2021. LNI P-312, Gesellschaft für Informatik e.V. 2021, ISBN 978-3-88579-706-7 [contents] - 2020
- [j8]Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker:
Stateful Protocol Composition and Typing. Arch. Formal Proofs 2020 (2020) - [j7]Andreas V. Hess, Sebastian Mödersheim, Achim D. Brucker, Anders Schlichtkrull:
Automated Stateful Protocol Verification. Arch. Formal Proofs 2020 (2020) - [c43]Joshua D. Guttman, Sebastian Mödersheim:
HotSpot: Hot Issues in Security Principles and Trust 2020. EuroS&P Workshops 2020: 260 - [c42]Anders Schlichtkrull, Sebastian Mödersheim:
Accountable Trust Decisions: A Semantic Approach. Open Identity Summit 2020: 71-82 - [e2]Heiko Roßnagel, Christian H. Schunck, Sebastian Mödersheim, Detlef Hühnlein:
Open Identity Summit 2020, 26-27 May, 2020, Copenhagen, Denmark. LNI P-305, Gesellschaft für Informatik e.V. 2020, ISBN 978-3-88579-699-2 [contents]
2010 – 2019
- 2019
- [j6]Sebastian Mödersheim, Luca Viganò:
Alpha-Beta Privacy. ACM Trans. Priv. Secur. 22(1): 7:1-7:35 (2019) - [c41]Sébastien Gondron, Sebastian Mödersheim:
Formalizing and Proving Privacy Properties of Voting Protocols Using Alpha-Beta Privacy. ESORICS (1) 2019: 535-555 - [c40]Sebastian Mödersheim, Anders Schlichtkrull, Georg Wagner, Stefan More, Lukas Alber:
TPL: A Trust Policy Language. IFIPTM 2019: 209-223 - [c39]Sebastian Alexander Mödersheim, Bihang Ni:
GTPL: A Graphical Trust Policy Language. Open Identity Summit 2019: 107-118 - 2018
- [c38]Andreas V. Hess, Sebastian Mödersheim:
A Typing Result for Stateful Protocols. CSF 2018: 374-388 - [c37]Andreas V. Hess, Sebastian Alexander Mödersheim, Achim D. Brucker:
Stateful Protocol Composition. ESORICS (1) 2018: 427-446 - 2017
- [c36]Andreas Viktor Hess, Sebastian Mödersheim:
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL. CSF 2017: 451-463 - 2016
- [j5]Michele Bugliesi, Stefano Calzavara, Sebastian Mödersheim, Paolo Modesti:
Security protocol specification and verification with AnBx. J. Inf. Secur. Appl. 30: 46-63 (2016) - [c35]Sebastian Mödersheim, Alessandro Bruni:
AIF-ω: Set-Based Protocol Abstraction with Countable Families. POST 2016: 233-253 - 2015
- [c34]Sören Bleikertz, Carsten Vogel, Thomas Groß, Sebastian Mödersheim:
Proactive Security Analysis of Changes in Virtualized Infrastructures. ACSAC 2015: 51-60 - [c33]Omar Almousa, Sebastian Mödersheim, Luca Viganò:
Alice and Bob: Reconciling Formal Models and Implementation. Programming Languages with Applications to Biology and Security 2015: 66-85 - [c32]Alessandro Bruni, Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson:
Set-Pi: Set Membership p-Calculus. CSF 2015: 185-198 - [c31]Omar Almousa, Sebastian Mödersheim, Paolo Modesti, Luca Viganò:
Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment. ESORICS (2) 2015: 209-229 - 2014
- [j4]Konstantinos Chatzikokolakis, Sebastian Alexander Mödersheim, Catuscia Palamidessi, Jun Pang:
Foundational aspects of security. J. Comput. Secur. 22(2): 201-202 (2014) - [c30]Sebastian Mödersheim, Luca Viganò:
Sufficient conditions for vertical composition of security protocols. AsiaCCS 2014: 435-446 - [c29]Sebastian Mödersheim, Georgios Katsoris:
A Sound Abstraction of the Parsing Problem. CSF 2014: 259-273 - 2013
- [c28]Sebastian Mödersheim, Thomas Groß, Luca Viganò:
Defining Privacy Is Supposed to Be Easy. LPAR 2013: 619-635 - [c27]Alessio Di Mauro, Xenofon Fafoutis, Sebastian Mödersheim, Nicola Dragoni:
Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs. NordSec 2013: 1-16 - [c26]Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson:
Lazy Mobile Intruders. POST 2013: 147-166 - 2012
- [c25]Sebastian Mödersheim:
Deciding Security for a Fragment of ASLan. ESORICS 2012: 127-144 - [c24]Alessandro Armando, Wihem Arsac, Tigran Avanesov, Michele Barletta, Alberto Calvi, Alessandro Cappai, Roberto Carbone, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Gabriel Erzse, Simone Frau, Marius Minea, Sebastian Mödersheim, David von Oheimb, Giancarlo Pellegrino, Serena Elisa Ponta, Marco Rocchetto, Michaël Rusinowitch, Mohammad Torabi Dashti, Mathieu Turuani, Luca Viganò:
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures. TACAS 2012: 267-282 - [e1]Sebastian Mödersheim, Catuscia Palamidessi:
Theory of Security and Applications - Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers. Lecture Notes in Computer Science 6993, Springer 2012, ISBN 978-3-642-27374-2 [contents] - 2011
- [c23]Sören Bleikertz, Thomas Groß, Sebastian Mödersheim:
Automated verification of virtualized infrastructures. CCSW 2011: 47-58 - [c22]Thomas Groß, Sebastian Mödersheim:
Vertical Protocol Composition. CSF 2011: 235-250 - [c21]Roberto Carbone, Marius Minea, Sebastian Mödersheim, Serena Elisa Ponta, Mathieu Turuani, Luca Viganò:
Towards Formal Validation of Trust and Security in the Internet of Services. Future Internet Assembly 2011: 193-208 - [c20]Sebastian Mödersheim:
Diffie-Hellman without Difficulty. Formal Aspects in Security and Trust 2011: 214-229 - [c19]Sebastian Mödersheim, Paolo Modesti:
Verifying SeVeCom using set-based abstraction. IWCMC 2011: 1164-1169 - 2010
- [j3]Sebastian Mödersheim, Luca Viganò, David A. Basin:
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols. J. Comput. Secur. 18(4): 575-618 (2010) - [c18]Sebastian Mödersheim:
Abstraction by set-membership: verifying security protocols and web services with databases. CCS 2010: 351-360 - [c17]David von Oheimb, Sebastian Mödersheim:
ASLan++ - A Formal Security Specification Language for Distributed Systems. FMCO 2010: 1-22 - [c16]Jan Camenisch, Sebastian Mödersheim, Dieter Sommer:
A Formal Model of Identity Mixer. FMICS 2010: 198-214 - [c15]Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer:
A card requirements language enabling privacy-preserving access control. SACMAT 2010: 119-128
2000 – 2009
- 2009
- [c14]Sebastian Mödersheim:
Algebraic Properties in Alice and Bob Notation. ARES 2009: 433-440 - [c13]Sebastian Mödersheim, Luca Viganò:
Secure Pseudonymous Channels. ESORICS 2009: 337-354 - [c12]Sebastian Mödersheim, Luca Viganò:
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols. FOSAD 2009: 166-194 - [c11]Achim D. Brucker, Sebastian Mödersheim:
Integrating Automated and Interactive Protocol Verification. Formal Aspects in Security and Trust 2009: 248-262 - 2008
- [j2]Sebastian Mödersheim:
On the relationships between models in protocol verification. Inf. Comput. 206(2-4): 291-311 (2008) - 2007
- [b1]Sebastian Mödersheim:
Models and methods for the automated analysis of security protocols. ETH Zurich, Zürich, Switzerland, 2007 - 2006
- [c10]Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. FoSSaCS 2006: 428-445 - [c9]Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin:
Formalizing and Analyzing Sender Invariance. Formal Aspects in Security and Trust 2006: 80-95 - [i1]Michael Backes, Sebastian Mödersheim, Birgit Pfitzmann, Luca Viganò:
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario. IACR Cryptol. ePrint Arch. 2006: 58 (2006) - 2005
- [j1]David A. Basin, Sebastian Mödersheim, Luca Viganò:
OFMC: A symbolic model checker for security protocols. Int. J. Inf. Sec. 4(3): 181-208 (2005) - [c8]Alessandro Armando, David A. Basin, Yohan Boichut, Yannick Chevalier, Luca Compagna, Jorge Cuéllar, Paul Hankes Drielsma, Pierre-Cyrille Héam, Olga Kouchnarenko, Jacopo Mantovani, Sebastian Mödersheim, David von Oheimb, Michaël Rusinowitch, Judson Santiago, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. CAV 2005: 281-285 - [c7]David A. Basin, Sebastian Mödersheim, Luca Viganò:
Algebraic Intruder Deductions. LPAR 2005: 549-564 - 2004
- [c6]Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò:
A Formalization of Off-Line Guessing for Security Protocol Analysis. LPAR 2004: 363-379 - [c5]Paul Hankes Drielsma, Sebastian Mödersheim:
The ASW Protocol Revisited: A Unified View. ARSPA@IJCAR 2004: 145-161 - 2003
- [c4]David A. Basin, Sebastian Mödersheim, Luca Viganò:
CDiff: a new reduction technique for constraint-based analysis of security protocols. CCS 2003: 335-344 - [c3]David A. Basin, Sebastian Mödersheim, Luca Viganò:
An On-the-Fly Model-Checker for Security Protocol Analysis. ESORICS 2003: 253-270 - 2002
- [c2]Alessandro Armando, David A. Basin, Mehdi Bouallagui, Yannick Chevalier, Luca Compagna, Sebastian Mödersheim, Michaël Rusinowitch, Mathieu Turuani, Luca Viganò, Laurent Vigneron:
The AVISS Security Protocol Analysis Tool. CAV 2002: 349-353 - 2000
- [c1]David A. Basin, Stefan Friedrich, Sebastian Mödersheim:
B2M: A Semantic Based Tool for BLIF Hardware Descriptions. FMCAD 2000: 91-107
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 21:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint