Author of the publication

Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers.

, and . CSF, page 310-324. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security protocols: from linear to classical logic by abstract interpretation.. Inf. Process. Lett., 95 (5): 473-479 (2005)Secrecy types for asymmetric communication., and . Theor. Comput. Sci., 298 (3): 387-415 (2003)Just fast keying in the pi calculus., , and . ACM Trans. Inf. Syst. Secur., 10 (3): 9 (2007)Escape analysis for JavaTM: Theory and practice.. ACM Trans. Program. Lang. Syst., 25 (6): 713-775 (2003)Analyzing security protocols with secrecy types and logic programs., and . J. ACM, 52 (1): 102-146 (2005)From Secrecy to Authenticity in Security Protocols.. SAS, volume 2477 of Lecture Notes in Computer Science, page 342-359. Springer, (2002)Automatic verification of correspondences for security protocols.. Journal of Computer Security, 17 (4): 363-434 (2009)SoK: Computer-Aided Cryptography., , , , , , and . SP, page 777-795. IEEE, (2021)A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol., , and . EuroS&P, page 231-246. IEEE, (2019)Composition Theorems for CryptoVerif and Application to TLS 1.3.. CSF, page 16-30. IEEE Computer Society, (2018)