Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Declaration of Software Independence., , , , and . CoRR, (2023)A Survey of Practical Formal Methods for Security., , , , , , and . CoRR, (2021)Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials., , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1836-1849 (2021)Legislation-driven development of a Gift Aid system using Event-B., , , and . Formal Aspects Comput., 32 (2-3): 251-273 (2020)Fine-Grained Trackability in Protocol Executions., , , , , , , and . NDSS, The Internet Society, (2023)Augmenting an Internet Voting System with Selene Verifiability using Permissioned Distributed Ledger., , , , , , , and . ICDCS, page 1167-1168. IEEE, (2020)Concurrent and Real Time Systems: The CSP Approach. John Wiley & Sons, Inc., New York, NY, USA, 1st edition, (1999)Vax-a-Net: Training-Time Defence Against Adversarial Patch Attacks., , and . ACCV (4), volume 12625 of Lecture Notes in Computer Science, page 235-251. Springer, (2020)The Web and the 2004 EP election: Comparing political actor Web sites in 11 EU Member States., , , and . Inf. Polity, 10 (3-4): 165-176 (2005)Preserving Privacy of Vulnerable Users across Heterogeneous Sensitive Sensor Data Streams using Smart Contracts., , , , and . BlockSys, page 2-8. ACM, (2023)