Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN., and . ACM Conference on Computer and Communications Security, page 456-467. ACM, (2016)Verified Cryptographic Implementations for TLS, , , and . ACM Trans. Inf. Syst. Secur., 15 (1): 3:1--3:32 (March 2012)A semantics for web services authentication., , and . POPL, page 198-209. ACM, (2004)Modular verification of security protocol code by typing., , and . POPL, page 445-456. ACM, (2010)TreeSync: Authenticated Group Management for Messaging Layer Security., , , and . USENIX Security Symposium, page 1217-1233. USENIX Association, (2023)Requirements for a Practical Network Event Recognition Language., and . RV@FLoC, volume 70 of Electronic Notes in Theoretical Computer Science, page 1-20. Elsevier, (2002)DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code., , , , , , and . EuroS&P, page 523-542. IEEE, (2021)Secure sessions for web services., , , and . SWS, page 56-66. ACM, (2004)Proving the TLS Handshake Secure (As It Is)., , , , , and . CRYPTO (2), volume 8617 of Lecture Notes in Computer Science, page 235-255. Springer, (2014)Implementing TLS with Verified Cryptographic Security., , , , and . IEEE Symposium on Security and Privacy, page 445-459. IEEE Computer Society, (2013)