Author of the publication

Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit.

, , , , , and . ACSAC, page 441-450. ACM, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proofs Methods for Bisimulation Based Information Flow Security., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 16-31. Springer, (2002)Type-Based Analysis of PKCS#11 Key Management., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 349-368. Springer, (2012)Secure Recharge of Disposable RFID Tickets., and . Formal Aspects in Security and Trust, volume 7140 of Lecture Notes in Computer Science, page 85-99. Springer, (2011)Authentication primitives for secure protocol specifications., , , and . Future Gener. Comput. Syst., 21 (4): 645-653 (2005)Gathering of robots in a ring with mobile faults., , , , and . Theor. Comput. Sci., (2019)BANANA - A Tool for Boundary Ambients Nesting ANAlysis., , , , , and . TACAS, volume 2619 of Lecture Notes in Computer Science, page 437-441. Springer, (2003)Automatic Compositional Verification of Some Security Properties., and . TACAS, volume 1055 of Lecture Notes in Computer Science, page 167-186. Springer, (1996)Editorial.. Journal of Computer Security, 18 (6): 969 (2010)Information flow security of multi-threaded distributed programs., and . PLAS, page 113-124. ACM, (2008)Compositional Analysis of Authentication Protocols., , and . ESOP, volume 2986 of Lecture Notes in Computer Science, page 140-154. Springer, (2004)