Author of the publication

Principles for Entity Authentication.

, , and . Ershov Memorial Conference, volume 2890 of Lecture Notes in Computer Science, page 294-306. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sub-session hijacking on the web: Root causes and prevention., , and . J. Comput. Secur., 27 (2): 233-257 (2019)On the Semantics of Inheritance in Logic Programming: Compositionality and Full Abstraction.. ELP, volume 660 of Lecture Notes in Computer Science, page 205-215. Springer, (1992)AnBx - Security Protocols Design and Verification., and . ARSPA-WITS, volume 6186 of Lecture Notes in Computer Science, page 164-184. Springer, (2010)Channel abstractions for network security., and . Math. Struct. Comput. Sci., 20 (1): 3-44 (2010)Static vs Dynamic Typing for Access Control in Pi-Calculus., , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 282-296. Springer, (2007)ALGOMOVE - A Move Embedding for Algorand., , , , and . Blockchain, page 62-67. IEEE, (2023)Formal Verification of Liferay RBAC., , and . ESSoS, volume 8978 of Lecture Notes in Computer Science, page 1-16. Springer, (2015)Automatic and Robust Client-Side Protection for Cookie-Based Sessions., , , and . ESSoS, volume 8364 of Lecture Notes in Computer Science, page 161-178. Springer, (2014)Writing Real-Time .Net Games in Casanova., , , , , and . ICEC, volume 7522 of Lecture Notes in Computer Science, page 341-348. Springer, (2012)Quite a mess in my cookie jar!: leveraging machine learning to protect web authentication., , , and . WWW, page 189-200. ACM, (2014)