Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographically Sound Implementations for Communicating Processes., and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 83-94. Springer, (2006)An Asynchronous, Distributed Implementation of Mobile Ambients., , and . IFIP TCS, volume 1872 of Lecture Notes in Computer Science, page 348-364. Springer, (2000)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2019)A hierarchy of equivalences for asynchronous calculi., and . J. Log. Algebraic Methods Program., 63 (1): 131-173 (2005)Inheritance in the join calculus., , , and . J. Log. Algebraic Methods Program., 57 (1-2): 23-69 (2003)Automated verification of selected equivalences for security protocols., , and . J. Log. Algebraic Methods Program., 75 (1): 3-51 (2008)Secure sessions for Web services., , , and . ACM Trans. Inf. Syst. Secur., 10 (2): 8 (2007)Bisimulations in the join-calculus., and . Theor. Comput. Sci., 266 (1-2): 569-603 (2001)SecPAL: Design and semantics of a decentralized authorization language., , and . J. Comput. Secur., 18 (4): 619-665 (2010)Mobile values, new names, and secure communication., and . POPL, page 104-115. ACM, (2001)ACM SIGPLAN Notices 36(3), March 2001.