Author of the publication

Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.

, , and . CSF, page 112-124. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Security Analysis of Periodic Systems: Expressiveness and Complexity., , , , , and . ICISSP, page 43-54. SCITEPRESS, (2021)A Probabilistic Poly-Time Framework for Protocol Analysis., , , and . ACM Conference on Computer and Communications Security, page 112-121. ACM, (1998)Towards an automated assistant for clinical investigations., , , , , and . IHI, page 773-778. ACM, (2012)Reduction-Based Formal Analysis of BGP Instances., , , , and . TACAS, volume 7214 of Lecture Notes in Computer Science, page 283-298. Springer, (2012)Computationally sound mechanized proofs for basic and public-key Kerberos., , , and . AsiaCCS, page 87-99. ACM, (2008)Some Semantic Aspects of Polymorphic Lambda Calculus, and . LICS, page 315-319. IEEE Computer Society, (1987)Some aspects of categorial semantics: sheves and glueing.. Logic Colloquium, page 281-302. Elsevier, (1985)Breaking and Fixing Public-Key Kerberos., , , , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 167-181. Springer, (2006)A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols., , , , , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 192-213. Springer, (2019)L-Models and R-Models for Lambek Calculus Enriched with Additives and the Multiplicative Unit., , and . WoLLIC, volume 11541 of Lecture Notes in Computer Science, page 373-391. Springer, (2019)