The documents distributed from this page have been provided as a means to ensure timely dissemination of scholarly and technical work on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
“Privacy-Enhanced Capabilities for VANETS Using Direct Anonymous Attestation.”
In 2017 IEEE Vehicular Networking Conference, VNC 2017, Torino, Italy, November 27-29, 2017, 123–30. Whitefield, Jorden, Liqun Chen, Thanassis Giannetsos, Steve Schneider, and Helen Treharne. 2017.
10.1109/VNC.2017.8275615 | Surrey ePubs
“Formal Analysis of V2X Revocation Protocols.”
In Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings, 147–63. Whitefield, Jorden, Liqun Chen, Frank Kargl, Andrew Paverd, Steve Schneider, Helen Treharne, and Stephan Wesemeyer. 2017.
10.1007/978-3-319-68063-7_10 | 1704.07216
“Symbolic Reachability Analysis of B Through ProB and LTSmin.”
In Integrated Formal Methods - 12th International Conference, IFM 2016, Reykjavik, Iceland, June 1-5, 2016, Proceedings, 275–91. Bendisposto, Jens, Philipp Körner, Michael Leuschel, Jeroen Meijer, Jaco van de Pol, Helen Treharne, and Jorden Whitefield. 2016.
10.1007/978-3-319-33693-0_18 | 1603.04401