Author of the publication

Computational Semantics for Basic Protocol Logic - A Stochastic Approach.

, , and . IACR Cryptology ePrint Archive, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Power-Saving in Storage Systems for Cloud Data Sharing Services with Data Access Prediction., , and . IEICE Trans. Inf. Syst., 98-D (10): 1744-1754 (2015)Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols., , and . IACR Cryptology ePrint Archive, (2010)Dynamic grid quorum: a reconfigurable grid quorum and its power optimization algorithm., , , and . Serv. Oriented Comput. Appl., 4 (4): 245-260 (2010)C2RBAC: An Extended Capability-Role-Based Access Control with Context Awareness for Dynamic Environments., and . SECRYPT, page 819-826. SCITEPRESS, (2021)Playstyle Generation for Geister With Genetic Algorithm and Clustering., and . ICAART (3), page 916-922. SCITEPRESS, (2023)Towards a guideline for clinical trials in the development of human assistive robots., , , , and . ROBIO, page 751-756. IEEE, (2010)Highly Available Primary-Backup Mechanism for Internet Services with Optimistic Consensus., , and . IC2E, page 410-416. IEEE Computer Society, (2014)Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols., , and . Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, page 33-56. Springer, (2009)Model Checking of BPMN Models for Reconfigurable Workflows., , , and . CoRR, (2016)Computationally complete symbolic attacker and key exchange., , and . ACM Conference on Computer and Communications Security, page 1231-1246. ACM, (2013)