Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Feature Integration as Substitution., , and . FIW, page 275-294. IOS Press, (2003)Cloud computing privacy concerns on our doorstep.. Commun. ACM, 54 (1): 36-38 (2011)StatVerif: Verification of stateful processes., , , and . J. Comput. Secur., 22 (5): 743-821 (2014)Automatic Analysis of Security Properties of the TPM.. INTRUST, volume 7711 of Lecture Notes in Computer Science, page 1-4. Springer, (2012)Making Decryption Accountable.. Security Protocols Workshop, volume 10476 of Lecture Notes in Computer Science, page 93-98. Springer, (2017)Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)., , , and . Dagstuhl Reports, 4 (9): 106-123 (2014)Privacy vs. Security, , and . Springer Briefs in Cybersecurity Springer, (2014)Proving feature non-interaction with Alternating-Time Temporal Logic., , and . FIREworks, page 85-103. Springer, (2000)Identity Escrow Protocol and Anonymity Analysis in the Applied Pi-Calculus., and . ACM Trans. Inf. Syst. Secur., 13 (4): 41:1-41:29 (2010)Model-checking the preservation of temporal properties upon feature integration., , and . Int. J. Softw. Tools Technol. Transf., 9 (1): 53-62 (2007)