Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security Goals and Evolving Standards., , and . SSR, volume 8893 of Lecture Notes in Computer Science, page 93-110. Springer, (2014)Searching for Shapes in Cryptographic Protocols., , and . TACAS, volume 4424 of Lecture Notes in Computer Science, page 523-537. Springer, (2007)Security Goals: Packet Trajectories and Strand Spaces.. FOSAD, volume 2171 of Lecture Notes in Computer Science, page 197-261. Springer, (2000)Understanding Attestation: Analyzing Protocols that Use Quotes., and . STM, volume 11738 of Lecture Notes in Computer Science, page 89-106. Springer, (2019)An Algebra for Symbolic Diffie-Hellman Protocol Analysis., and . TGC, volume 8191 of Lecture Notes in Computer Science, page 164-181. Springer, (2012)Information Flow, Distributed Systems, and Refinement, by Example.. Concurrency, Security, and Puzzles, volume 10160 of Lecture Notes in Computer Science, page 88-103. Springer, (2017)Introduction.. Journal of Computer Security, 17 (5): 515 (2009)Security for Mobile Agents: Authentication and State Appraisal., , and . ESORICS, volume 1146 of Lecture Notes in Computer Science, page 118-130. Springer, (1996)Three Applications of Formal Methods at MITRE., and . FME, volume 873 of Lecture Notes in Computer Science, page 55-65. Springer, (1994)Filtering Postures: Local Enforcement for Global Policies.. S&P, page 120-129. IEEE Computer Society, (1997)