From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR., , , и . CSF, стр. 359-373. IEEE Computer Society, (2018)Verifying Table-Based Elections., , , и . CCS, стр. 2632-2652. ACM, (2021)On the existence and decidability of unique decompositions of processes in the applied π-calculus., , , и . Theor. Comput. Sci., (2016)Shaken, not Stirred - Automated Discovery of Subtle Attacks on Protocols using Mix-Nets., , и . USENIX Security Symposium, USENIX Association, (2024)Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols., , , и . POST, том 10204 из Lecture Notes in Computer Science, стр. 117-140. Springer, (2017)On Unique Decomposition of Processes in the Applied π-Calculus., , , и . FoSSaCS, том 7794 из Lecture Notes in Computer Science, стр. 50-64. Springer, (2013)Symbolically analyzing security protocols using tamarin., , , и . ACM SIGLOG News, 4 (4): 19-30 (2017)Optimal Threshold Padlock Systems., , , и . CoRR, (2020)Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols., , и . ESORICS (2), том 12309 из Lecture Notes in Computer Science, стр. 3-22. Springer, (2020)A Formal Analysis of 5G Authentication., , , , , и . CCS, стр. 1383-1396. ACM, (2018)