Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the freedom of decryption.. Inf. Process. Lett., 86 (6): 329-333 (2003)A note on information flow into arrays., , and . ACM SIGSOFT Softw. Eng. Notes, 5 (1): 28-29 (1980)Biba Model.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Depender Graphs: A Method of Fault-Tolerant Certificate Distribution., , and . J. Comput. Secur., 9 (4): 323-338 (2001)A Long, Slow Conversation.. Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 6-7. Springer, (2019)Microtext: the design of a microprogrammed finite state search machine for full-text retrieval., and . AFIPS Fall Joint Computing Conference (1), volume 41 of AFIPS Conference Proceedings, page 479-488. AFIPS / ACM / Thomson Book Company, Washington D.C., (1972)Optimizing Protocol Rewrite Rules of CIL Specifications., , , and . CSFW, page 52-62. IEEE Computer Society, (2000)Non-Interference: Who Needs It?, , , and . CSFW, page 237-238. IEEE Computer Society, (2001)A resource allocation model for denial of service.. S&P, page 137-147. IEEE Computer Society, (1992)The Interrogator: Protocol Security Analysis., , and . IEEE Trans. Software Eng., 13 (2): 274-288 (1987)