Author of the publication

Bisimulation and Unwinding for Verifying Possibilistic Security Properties.

, , , and . VMCAI, volume 2575 of Lecture Notes in Computer Science, page 223-237. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

BANANA - A Tool for Boundary Ambients Nesting ANAlysis., , , , , and . TACAS, volume 2619 of Lecture Notes in Computer Science, page 437-441. Springer, (2003)Automatic Compositional Verification of Some Security Properties., and . TACAS, volume 1055 of Lecture Notes in Computer Science, page 167-186. Springer, (1996)Editorial.. Journal of Computer Security, 18 (6): 969 (2010)Information flow security of multi-threaded distributed programs., and . PLAS, page 113-124. ACM, (2008)Compositional Analysis of Authentication Protocols., , and . ESOP, volume 2986 of Lecture Notes in Computer Science, page 140-154. Springer, (2004)Static Analysis of Authentication.. FOSAD, volume 3655 of Lecture Notes in Computer Science, page 109-132. Springer, (2004)Secure Recharge of Disposable RFID Tickets., and . Formal Aspects in Security and Trust, volume 7140 of Lecture Notes in Computer Science, page 85-99. Springer, (2011)Authentication primitives for secure protocol specifications., , , and . Future Gener. Comput. Syst., 21 (4): 645-653 (2005)Type-Based Analysis of PKCS#11 Key Management., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 349-368. Springer, (2012)Proofs Methods for Bisimulation Based Information Flow Security., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 16-31. Springer, (2002)