Author of the publication

Compositional Weak Metrics for Group Key Update.

, , and . MFCS, volume 83 of LIPIcs, page 72:1-72:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Aliasing Models for Object Migration., , , and . Euro-Par, volume 1685 of Lecture Notes in Computer Science, page 1353-1368. Springer, (1999)Modelling MAC-Layer Communications in Wireless Systems., , and . COORDINATION, volume 7890 of Lecture Notes in Computer Science, page 16-30. Springer, (2013)A Timed Calculus for Wireless Systems., and . FSEN, volume 5961 of Lecture Notes in Computer Science, page 228-243. Springer, (2009)A Calculus of Trustworthy Ad Hoc Networks., and . Formal Aspects in Security and Trust, volume 5983 of Lecture Notes in Computer Science, page 157-172. Springer, (2009)Modelling MAC-Layer Communications in Wireless Systems., , and . Logical Methods in Computer Science, (2015)Equational Reasonings in Wireless Network Gossip Protocols., , and . Logical Methods in Computer Science, (2018)A Semantic Theory for the Internet of Things., , and . CoRR, (2015)Equational Reasonings in Wireless Network Gossip Protocols., , and . CoRR, (2017)Aliasing Models for Mobile Objects., , , and . Inf. Comput., 175 (1): 3-33 (2002)Impact Analysis of Coordinated Cyber-Physical Attacks via Statistical Model Checking: A Case Study., , and . FORTE, volume 13910 of Lecture Notes in Computer Science, page 75-94. Springer, (2023)