Author of the publication

Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.

, , and . CSF, page 112-124. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Security Analysis of Periodic Systems: Expressiveness and Complexity., , , , , and . ICISSP, page 43-54. SCITEPRESS, (2021)Polynomially Grade Logic I: A Graded Version of System T, , and . LICS, page 375-385. IEEE Computer Society, (1989)Computationally sound mechanized proofs for basic and public-key Kerberos., , , and . AsiaCCS, page 87-99. ACM, (2008)Some aspects of categorial semantics: sheves and glueing.. Logic Colloquium, page 281-302. Elsevier, (1985)Towards an automated assistant for clinical investigations., , , , , and . IHI, page 773-778. ACM, (2012)A Probabilistic Poly-Time Framework for Protocol Analysis., , , and . ACM Conference on Computer and Communications Security, page 112-121. ACM, (1998)Reduction-Based Formal Analysis of BGP Instances., , , , and . TACAS, volume 7214 of Lecture Notes in Computer Science, page 283-298. Springer, (2012)Breaking and Fixing Public-Key Kerberos., , , , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 167-181. Springer, (2006)A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols., , , , , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 192-213. Springer, (2019)Some Semantic Aspects of Polymorphic Lambda Calculus, and . LICS, page 315-319. IEEE Computer Society, (1987)