Author of the publication

Analysis of Typed Analyses of Authentication Protocols.

, , and . CSFW, page 112-125. IEEE Computer Society, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Semantics of Inheritance in Logic Programming: Compositionality and Full Abstraction.. ELP, volume 660 of Lecture Notes in Computer Science, page 205-215. Springer, (1992)Static vs Dynamic Typing for Access Control in Pi-Calculus., , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 282-296. Springer, (2007)AnBx - Security Protocols Design and Verification., and . ARSPA-WITS, volume 6186 of Lecture Notes in Computer Science, page 164-184. Springer, (2010)Channel abstractions for network security., and . Math. Struct. Comput. Sci., 20 (1): 3-44 (2010)Sub-session hijacking on the web: Root causes and prevention., , and . J. Comput. Secur., 27 (2): 233-257 (2019)Writing Real-Time .Net Games in Casanova., , , , , and . ICEC, volume 7522 of Lecture Notes in Computer Science, page 341-348. Springer, (2012)ALGOMOVE - A Move Embedding for Algorand., , , , and . Blockchain, page 62-67. IEEE, (2023)Formal Verification of Liferay RBAC., , and . ESSoS, volume 8978 of Lecture Notes in Computer Science, page 1-16. Springer, (2015)Quite a mess in my cookie jar!: leveraging machine learning to protect web authentication., , , and . WWW, page 189-200. ACM, (2014)Automatic and Robust Client-Side Protection for Cookie-Based Sessions., , , and . ESSoS, volume 8364 of Lecture Notes in Computer Science, page 161-178. Springer, (2014)