From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Feature Integration as Substitution., , и . FIW, стр. 275-294. IOS Press, (2003)StatVerif: Verification of stateful processes., , , и . J. Comput. Secur., 22 (5): 743-821 (2014)Making Decryption Accountable.. Security Protocols Workshop, том 10476 из Lecture Notes in Computer Science, стр. 93-98. Springer, (2017)Automatic Analysis of Security Properties of the TPM.. INTRUST, том 7711 из Lecture Notes in Computer Science, стр. 1-4. Springer, (2012)Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401)., , , и . Dagstuhl Manifestos, 5 (1): 25-37 (2015)07421 Executive Summary -- Formal Protocol Verification Applied., , и . Formal Protocol Verification Applied, том 07421 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Defining Features for CSP: Reflections on the Feature Interaction Contest., и . FIREworks, стр. 163-175. Springer, (2000)Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security Properties., , , и . STM, том 12386 из Lecture Notes in Computer Science, стр. 3-21. Springer, (2020)Malware Tolerant (Mesh-)Networks., и . CANS, том 11124 из Lecture Notes in Computer Science, стр. 133-153. Springer, (2018)Du-Vote: Remote Electronic Voting with Untrusted Computers., , , и . CSF, стр. 155-169. IEEE Computer Society, (2015)