Author of the publication

Safe Equivalences for Security Properties.

, , , and . IFIP TCS, volume 323 of IFIP Advances in Information and Communication Technology, page 55-70. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quantitative Analysis of Information Leakage in Probabilistic and Nondeterministic Systems.. Radboud University Nijmegen, Netherlands, (2011)Information Hiding in Probabilistic Concurrent Systems., , , and . QEST, page 17-26. IEEE Computer Society, (2010)Significant Diagnostic Counterexamples in Probabilistic Model Checking., , and . Haifa Verification Conference, volume 5394 of Lecture Notes in Computer Science, page 129-148. Springer, (2008)Quantitative information flow in interactive systems., , and . J. Comput. Secur., 20 (1): 3-50 (2012)Information Flow in Interactive Systems., , and . CONCUR, volume 6269 of Lecture Notes in Computer Science, page 102-116. Springer, (2010)Interactive Information Flow - (Invited Talk)., , and . ARSPA-WITS, volume 6186 of Lecture Notes in Computer Science, page 111. Springer, (2010)Entropy and Attack Models in Information Flow - (Invited Talk)., , and . IFIP TCS, volume 323 of IFIP Advances in Information and Communication Technology, page 53-54. Springer, (2010)Probabilistic Information Flow., , and . LICS, page 314-321. IEEE Computer Society, (2010)Preface to the special issue on quantitative information flow., , and . Math. Struct. Comput. Sci., 25 (2): 203-206 (2015)Conditional Probabilities over Probabilistic and Nondeterministic Systems., and . TACAS, volume 4963 of Lecture Notes in Computer Science, page 157-172. Springer, (2008)