Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tamarin: Verification of Large-Scale, Real-World, Cryptographic Protocols., , , and . IEEE Secur. Priv., 20 (3): 24-32 (2022)Formally and practically verifying flow properties in industrial systems., , , , and . Comput. Secur., (2019)Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR., , , and . CSF, page 359-373. IEEE Computer Society, (2018)Security Issues in the 5G Standard and How Formal Methods Come to the Rescue., , and . ERCIM News, (2019)Verification of stateful cryptographic protocols with exclusive OR., , , and . J. Comput. Secur., 28 (1): 1-34 (2020)Verifying Table-Based Elections., , , and . CCS, page 2632-2652. ACM, (2021)Formal Analysis of 5G Authentication., , , , , and . CoRR, (2018)A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange., , , and . EuroS&P, page 76-91. IEEE, (2017)Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability., , , , , , , and . CCS, page 397-410. ACM, (2022)Automated Symbolic Proofs of Observational Equivalence., , and . CCS, page 1144-1155. ACM, (2015)