Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version)., , , , , , , and . CoRR, (2022)Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions., , and . USENIX Security Symposium, page 179-194. USENIX Association, (2021)A Systematic Approach to Uncover Security Flaws in GUI Logic., , , and . S&P, page 71-85. IEEE Computer Society, (2007)Sound Verification of Security Protocols: From Design to Interoperable Implementations., , , , , , , and . SP, page 1077-1093. IEEE, (2023)A Symbolic Analysis of ECC-Based Direct Anonymous Attestation., , , , , and . EuroS&P, page 127-141. IEEE, (2019)Folding Variant Narrowing and Optimal Variant Termination., , and . WRLA, volume 6381 of Lecture Notes in Computer Science, page 52-68. Springer, (2010)Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis., , , , , , , , , and . CADE, volume 7898 of Lecture Notes in Computer Science, page 231-248. Springer, (2013)Formal Analysis of 5G Authentication., , , , , and . CoRR, (2018)Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure., , , , , and . IEEE Trans. Dependable Secur. Comput., 15 (3): 393-408 (2018)Proxy Certificates: The Missing Link in the Web's Chain of Trust., , , , , and . CoRR, (2019)