Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Validating Attacks on Authentication Protocols.. ISCC, page 481-488. IEEE Computer Society, (2007)Formal Modeling of Authentication in SIP Registration., and . SECURWARE, page 16-21. IEEE Computer Society, (2008)Large scale construction of railroad models from specifications., and . SMC (7), page 6212-6219. IEEE, (2004)Designing attacks on SIP call set-up., and . Int. J. Appl. Cryptogr., 2 (1): 13-22 (2010)Constructing and Refining Large-Scale Railway Models Represented by Petri Nets., , , and . IEEE Trans. Syst. Man Cybern. Part C, 37 (4): 444-460 (2007)Automated detection of confidentiality goals.. IPDPS, page 1-8. IEEE, (2009)Errors in Attacks on Authentication Protocols.. ARES, page 223-229. IEEE Computer Society, (2007)Protocol Algebra.. ISCC, page 394-401. IEEE Computer Society, (2006)Automated refinement of security protocols.. IPDPS, IEEE, (2006)Proving Trust Locally.. SECURWARE, page 80-87. IEEE Computer Society, (2008)