Author of the publication

Folding variant narrowing and optimal variant termination.

, , and . J. Log. Algebraic Methods Program., 81 (7-8): 898-928 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sound Verification of Security Protocols: From Design to Interoperable Implementations (extended version)., , , , , , , and . CoRR, (2022)A Symbolic Analysis of ECC-Based Direct Anonymous Attestation., , , , , and . EuroS&P, page 127-141. IEEE, (2019)A Systematic Approach to Uncover Security Flaws in GUI Logic., , , and . S&P, page 71-85. IEEE Computer Society, (2007)Sound Verification of Security Protocols: From Design to Interoperable Implementations., , , , , , , and . SP, page 1077-1093. IEEE, (2023)Card Brand Mixup Attack: Bypassing the PIN in non-Visa Cards by Using Them for Visa Transactions., , and . USENIX Security Symposium, page 179-194. USENIX Association, (2021)Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis., , , , , , , , , and . CADE, volume 7898 of Lecture Notes in Computer Science, page 231-248. Springer, (2013)Folding Variant Narrowing and Optimal Variant Termination., , and . WRLA, volume 6381 of Lecture Notes in Computer Science, page 52-68. Springer, (2010)Formal Analysis of 5G Authentication., , , , , and . CoRR, (2018)Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure., , , , , and . IEEE Trans. Dependable Secur. Comput., 15 (3): 393-408 (2018)Proxy Certificates: The Missing Link in the Web's Chain of Trust., , , , , and . CoRR, (2019)