Author of the publication

A Proof System for Information Flow Security.

, , , and . LOPSTR, volume 2664 of Lecture Notes in Computer Science, page 199-218. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Type-Based Analysis of PKCS#11 Key Management., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 349-368. Springer, (2012)BANANA - A Tool for Boundary Ambients Nesting ANAlysis., , , , , and . TACAS, volume 2619 of Lecture Notes in Computer Science, page 437-441. Springer, (2003)Proofs Methods for Bisimulation Based Information Flow Security., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 16-31. Springer, (2002)Automatic Compositional Verification of Some Security Properties., and . TACAS, volume 1055 of Lecture Notes in Computer Science, page 167-186. Springer, (1996)Static Analysis of Authentication.. FOSAD, volume 3655 of Lecture Notes in Computer Science, page 109-132. Springer, (2004)Compositional Analysis of Authentication Protocols., , and . ESOP, volume 2986 of Lecture Notes in Computer Science, page 140-154. Springer, (2004)Information flow security of multi-threaded distributed programs., and . PLAS, page 113-124. ACM, (2008)Editorial.. Journal of Computer Security, 18 (6): 969 (2010)Secure Recharge of Disposable RFID Tickets., and . Formal Aspects in Security and Trust, volume 7140 of Lecture Notes in Computer Science, page 85-99. Springer, (2011)Authentication primitives for secure protocol specifications., , , and . Future Gener. Comput. Syst., 21 (4): 645-653 (2005)