Author of the publication

Causality-based Abstraction of Multiplicity in Security Protocols.

, , and . CSF, page 355-369. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distortion-Free Authentication Watermarking., and . ICSOFT (Selected Papers), volume 170 of Communications in Computer and Information Science, page 205-219. Springer, (2010)The Quotient of an Abstract Interpretation., , and . Theor. Comput. Sci., 202 (1-2): 163-192 (1998)Boundary Inference for Enforcing Security Policies in Mobile Ambients., , , and . IFIP TCS, volume 223 of IFIP Conference Proceedings, page 383-395. Kluwer, (2002)Non-repudiation analysis using LySa with annotations., and . Comput. Lang. Syst. Struct., 36 (4): 352-377 (2010)Sentence Embedding Models for Similarity Detection of Software Requirements., , , and . SN Comput. Sci., 2 (1): 69 (2021)A Generic Distortion Free Watermarking Technique for Relational Databases., and . ICISS, volume 5905 of Lecture Notes in Computer Science, page 252-264. Springer, (2009)Ensuring determinism in blockchain software with GoLiSA: an industrial experience report., , , , , , , , and . SOAP@PLDI, page 23-29. ACM, (2022)KPI-Supported PDCA Model for Innovation Policy Management in Local Government., and . EGOV, volume 6846 of Lecture Notes in Computer Science, page 320-331. Springer, (2011)Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems., , , , , , and . EuroS&P Workshops, page 57-66. IEEE, (2019)Prop revisited: Propositional Formula as Abstract Domain for Groundness Analysis, , and . LICS, page 322-327. IEEE Computer Society, (1991)