Author of the publication

Time, computational complexity, and probability in the analysis of distance-bounding protocols.

, , , , and . J. Comput. Secur., 25 (6): 585-630 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal specification of multisimulations using Maude., , , and . SpringSim (TMS-DEVS), page 22. SCS/ACM, (2012)Eos: An Approach of Using Behavior Implications for Policy-Based Self-Management., , and . DSOM, volume 2867 of Lecture Notes in Computer Science, page 16-27. Springer, (2003)A Compositional Framework for Preference-Aware Agents., , and . V2CPS@IFM, volume 232 of EPTCS, page 21-35. (2016)Reasoning about effects: from lists to cyber-physical agents., and . CoRR, (2018)Symbolic Timed Observational Equivalence., , and . CoRR, (2018)A semantic model for safe protocol interaction., , and . SAC, page 1599-1600. ACM, (2006)A formal model for reasoning about adaptive QoS-enabled middleware., , and . ACM Trans. Softw. Eng. Methodol., 13 (1): 86-147 (2004)Reasoning About Programs with Effects., and . PLILP, volume 456 of Lecture Notes in Computer Science, page 189-203. Springer, (1990)Representing and Simulating Protein Functional Domains in Signal Transduction Using Maude., , , , and . CMSB, volume 2602 of Lecture Notes in Computer Science, page 164-165. Springer, (2003)A Theory for Program and Data Type Specification.. Theor. Comput. Sci., 104 (1): 129-159 (1992)