Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols., , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 422-437. Springer, (2007)iUC: Flexible Universal Composability Made Simple., , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 191-221. Springer, (2019)Using ProVerif to Analyze Protocols with Diffie-Hellman Exponentiation., and . CSF, page 157-171. IEEE Computer Society, (2009)Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking., , and . IEEE Symposium on Security and Privacy, page 343-358. IEEE Computer Society, (2014)Characterizing the semantics of terminological cycles with the help of finite automata.. Description Logics, volume 410 of URA-CNRS, (1997)Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric., , and . EuroS&P, page 236-255. IEEE, (2020)Extensions to Description Logics., , and . Description Logic Handbook, Cambridge University Press, (2003)A Formal Definition of Online Abuse-Freeness., , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 484-497. Springer, (2010)Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation., , and . J. Cryptol., 33 (4): 1585-1658 (2020)Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach., and . ACM Conference on Computer and Communications Security, page 129-138. ACM, (2008)