From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Lack of Explicitness Strikes Back.. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 87-93. Springer, (2000)Formal Verification of Cardholder Registration in SET., , , и . ESORICS, том 1895 из Lecture Notes in Computer Science, стр. 159-174. Springer, (2000)Layered Analysis of Security Ceremonies., и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 273-286. Springer, (2012)Formal Analysis of the Genetic Toggle., и . CMSB, том 5688 из Lecture Notes in Computer Science, стр. 96-110. Springer, (2009)Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing., и . Journal of Computer Security, 17 (3): 237 (2009)Soft Constraint Programming to Analysing Security Protocols., и . Theory Pract. Log. Program., 4 (5-6): 545-572 (2004)Multi-service threats: Attacking and protecting network printers and VoIP phones alike., , и . Internet Things, (2022)Designing and implementing an AUTOSAR-based Basic Software Module for enhanced security., , , и . Comput. Networks, (2022)Vulnerability Assessment and Penetration Testing on IP cameras., , и . CoRR, (2022)Inductive Verification of Smart Card Protocols.. J. Comput. Secur., 11 (1): 87-132 (2003)