From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version)., , , , , , , и . CoRR, (2022)Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions., , и . USENIX Security Symposium, стр. 179-194. USENIX Association, (2021)A Symbolic Analysis of ECC-Based Direct Anonymous Attestation., , , , , и . EuroS&P, стр. 127-141. IEEE, (2019)A Systematic Approach to Uncover Security Flaws in GUI Logic., , , и . S&P, стр. 71-85. IEEE Computer Society, (2007)Sound Verification of Security Protocols: From Design to Interoperable Implementations., , , , , , , и . SP, стр. 1077-1093. IEEE, (2023)Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis., , , , , , , , , и . CADE, том 7898 из Lecture Notes in Computer Science, стр. 231-248. Springer, (2013)Folding Variant Narrowing and Optimal Variant Termination., , и . WRLA, том 6381 из Lecture Notes in Computer Science, стр. 52-68. Springer, (2010)Folding variant narrowing and optimal variant termination., , и . J. Log. Algebraic Methods Program., 81 (7-8): 898-928 (2012)Formal Analysis of 5G Authentication., , , , , и . CoRR, (2018)The EMV Standard: Break, Fix, Verify., , и . CoRR, (2020)