Author of the publication

Proving the TLS Handshake Secure (As It Is).

, , , , , and . CRYPTO (2), volume 8617 of Lecture Notes in Computer Science, page 235-255. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Nonlinear dynamic allocator for optimal input/output performance trade-off: Application to the JET tokamak shape controller., , , , and . Autom., 47 (5): 981-987 (2011)Hinifinity optimal terminal control for linear systems with delayed states and controls., and . Autom., 44 (10): 2676-2679 (2008)Solution of the state feedback singular Hinfinity control problem for linear time-varying systems., , and . Autom., 36 (10): 1469-1479 (2000)Asymptotic analysis of the Friedkin-Johnsen model when the matrix of the susceptibility weights approaches the identity matrix.. CoRR, (2018)A strategy for the optimal choice of the magnetic sensors for the estimation of plasma parameters with fault tolerance in the ITER tokamak., , , , and . IECON, page 6364-6369. IEEE, (2016)On the finite-time boundedness of linear systems., , , , and . Autom., (2019)Safe abstractions of data encodings in formal security protocol models., and . Formal Aspects Comput., 26 (1): 125-167 (2014)Formal verification of security protocol implementations: a survey., , and . Formal Aspects Comput., 26 (1): 99-123 (2014)Assessing the finite-time stability of nonlinear systems by means of physics-informed neural networks., and . Syst. Control. Lett., (August 2023)Simultaneous control of modes with multiple toroidal periodicity in tokamak plasmas., , , and . CDC, page 4335-4340. IEEE, (2012)