Author of the publication

Computational Semantics for Basic Protocol Logic - A Stochastic Approach.

, , and . IACR Cryptology ePrint Archive, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker., , and . IACR Cryptology ePrint Archive, (2012)A Semantics for "Typically" in First-Order Default Reasoning., and . JSAI-isAI Workshops, volume 12758 of Lecture Notes in Computer Science, page 3-20. Springer, (2020)Computational and Information-Theoretic Soundness and Completeness of Formal Encryption., , and . CSFW, page 170-184. IEEE Computer Society, (2005)Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability., and . IACR Cryptology ePrint Archive, (2016)Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols., , and . IACR Cryptology ePrint Archive, (2010)A Computationally Complete Symbolic Attacker for Equivalence Properties., and . ACM Conference on Computer and Communications Security, page 609-620. ACM, (2014)Convergence Voting: From Pairwise Comparisons to Consensus., , , and . CoRR, (2021)Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol., , , , , , , , and . E-Vote-ID, volume 13553 of Lecture Notes in Computer Science, page 19-35. Springer, (2022)Soundness and Completeness of Formal Logics of Symmetric Encryption.. IACR Cryptology ePrint Archive, (2005)Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker., , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 350-372. Springer, (2018)