Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Proof with Dishonest Keys., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 149-168. Springer, (2012)Intruder Theories (Ongoing Work).. FoSSaCS, volume 2987 of Lecture Notes in Computer Science, page 1-4. Springer, (2004)A Computationally Complete Symbolic Attacker for Equivalence Properties., and . ACM Conference on Computer and Communications Security, page 609-620. ACM, (2014)Computational soundness of observational equivalence., and . ACM Conference on Computer and Communications Security, page 109-118. ACM, (2008)Models and Proofs of Protocol Security: A Progress Report., , and . CAV, volume 5643 of Lecture Notes in Computer Science, page 35-49. Springer, (2009)Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables., and . Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, page 1-20. Springer, (2009)Computational Soundness of Indistinguishability Properties without Computable Parsing., , , and . ISPEC, volume 7232 of Lecture Notes in Computer Science, page 63-79. Springer, (2012)Constraint solving techniques and enriching the model with equational theories., , and . Formal Models and Techniques for Analyzing Security Protocols, volume 5 of Cryptology and Information Security Series, IOS Press, (2011)Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions., and . RTA, volume 5595 of Lecture Notes in Computer Science, page 133-147. Springer, (2009)Normal Attacks on Security Protocols.. Abstract State Machines, page 70. (2005)