Author of the publication

Analysis of Key Wrapping APIs: Generic Policies, Computational Security.

, and . CSF, page 281-295. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tractable Inference Systems: An Extension with a Deducibility Predicate., , and . CADE, volume 7898 of Lecture Notes in Computer Science, page 91-108. Springer, (2013)Security Proof with Dishonest Keys., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 149-168. Springer, (2012)Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments., , , and . TrustCom/BigDataSE, page 381-388. IEEE, (2019)Symbolic Models for Isolated Execution Environments., , and . EuroS&P, page 530-545. IEEE, (2017)Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets., , and . ACM Conference on Computer and Communications Security, page 1427-1444. ACM, (2020)Consent-driven data use in crowdsensing platforms: When data reuse meets privacy-preservation., , , and . PerCom, page 1-10. IEEE, (2021)Foundations of Hardware-Based Attested Computation and Application to SGX., , , and . EuroS&P, page 245-260. IEEE, (2016)Personal Data Management Systems: The security and functionality standpoint., , , , , , and . Inf. Syst., (2019)Proofs of security protocols revisited. (Les preuves de protocoles cryptographiques revisitées).. École normale supérieure de Cachan, France, (2015)A new PET for Data Collection via Forms with Data Minimization, Full Accuracy and Informed Consent., , , , and . EDBT, page 81-93. OpenProceedings.org, (2024)