From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyse des protocoles cryptographiques: des modèles symboliques aux modèles calculatoires. (Analysis of cryptographic protocols: from symbolic to computational models).. (2009)Computationally Sound Symbolic Secrecy in the Presence of Hash Functions., , , и . FSTTCS, том 4337 из Lecture Notes in Computer Science, стр. 176-187. Springer, (2006)Electronic Voting: How Logic Can Help.. CIAA, том 10329 из Lecture Notes in Computer Science, стр. xi-xii. Springer, (2017)Introduction., и . Formal Models and Techniques for Analyzing Security Protocols, том 5 из Cryptology and Information Security Series, IOS Press, (2011)A Type System for Privacy Properties., , , и . CCS, стр. 409-423. ACM, (2017)A small bound on the number of sessions for security protocols., , и . CSF, стр. 33-48. IEEE, (2022)A Formal Analysis of the Neuchatel e-Voting Protocol., , и . EuroS&P, стр. 430-442. IEEE, (2018)Tractable Inference Systems: An Extension with a Deducibility Predicate., , и . CADE, том 7898 из Lecture Notes in Computer Science, стр. 91-108. Springer, (2013)Security Properties: Two Agents Are Sufficient., и . ESOP, том 2618 из Lecture Notes in Computer Science, стр. 99-113. Springer, (2003)Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability., , , , , , , и . CCS, стр. 397-410. ACM, (2022)