Author of the publication

Model-Based Detection of CSRF.

, , and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 30-43. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Access Control Synthesis for Physical Spaces., , and . CSF, page 443-457. IEEE Computer Society, (2016)Model-Based Detection of CSRF., , and . SEC, volume 428 of IFIP Advances in Information and Communication Technology, page 30-43. Springer, (2014)Scalable, privacy preserving radio-frequency identification protocol for the internet of things., and . Concurr. Comput. Pract. Exp., 27 (8): 1932-1950 (2015)Derailing Attacks (Transcript of Discussion).. Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 47-49. Springer, (2015)Constructing Mid-Points for Two-Party Asynchronous Protocols., , and . OPODIS, volume 7109 of Lecture Notes in Computer Science, page 481-496. Springer, (2011)SECFUZZ: Fuzz-testing security protocols., , and . AST, page 1-7. IEEE Computer Society, (2012)Partial Order Reduction for Branching Security Protocols., , and . ACSD, page 191-200. IEEE Computer Society, (2010)A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets., and . TrustCom, page 206-213. IEEE Computer Society, (2011)VERA: A Flexible Model-Based Vulnerability Testing Tool., , , , and . ICST, page 471-478. IEEE Computer Society, (2013)LTL is closed under topological closure., , and . Inf. Process. Lett., 114 (8): 408-413 (2014)