From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR., , , и . CSF, стр. 359-373. IEEE Computer Society, (2018)Verifying Table-Based Elections., , , и . CCS, стр. 2632-2652. ACM, (2021)On the existence and decidability of unique decompositions of processes in the applied π-calculus., , , и . Theor. Comput. Sci., (2016)Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets., , и . USENIX Security Symposium, USENIX Association, (2024)A Novel Approach for Reasoning about Liveness in Cryptographic Protocols and Its Application to Fair Exchange., , , и . EuroS&P, стр. 76-91. IEEE, (2017)Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability., , , , , , , и . CCS, стр. 397-410. ACM, (2022)Automated Symbolic Proofs of Observational Equivalence., , и . CCS, стр. 1144-1155. ACM, (2015)On Unique Decomposition of Processes in the Applied π-Calculus., , , и . FoSSaCS, том 7794 из Lecture Notes in Computer Science, стр. 50-64. Springer, (2013)Symbolically analyzing security protocols using tamarin., , , и . ACM SIGLOG News, 4 (4): 19-30 (2017)Optimal Threshold Padlock Systems., , , и . CoRR, (2020)