Author of the publication

A Compositional Logic for Proving Security Properties of Protocols.

, , and . J. Comput. Secur., 11 (4): 677-722 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods., and . WOOT, USENIX Association, (2008)The Development of Type Systems for Object-Oriented Languages., and . Theory Pract. Object Syst., 1 (3): 189-220 (1995)On the Type Structure of Standard ML., and . ACM Trans. Program. Lang. Syst., 15 (2): 211-252 (1993)preliminary version: POPL 1988: 28-46.A Layered Architecture for Detecting Malicious Behaviors., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 78-97. Springer, (2008)Parametricity and Variants of Girard's J Operator., and . Inf. Process. Lett., 70 (1): 1-5 (1999)A Learning-Based Approach to Reactive Security, , , , , and . CoRR, (2009)Inductive Trace Properties for Computational Security., , , and . IACR Cryptology ePrint Archive, (2006)Determination of Thermodynamic and Kinetic Parameters from Isothermal Heat Conduction Microcalorimetry: Applications to Long-Term-Reaction Studies, , , and . The Journal of Physical Chemistry, 99 (18): 7108--7113 (May 1995)Probabilistic Polynomial-Time Semantics for a Protocol Security Logic., , , , and . ICALP, volume 3580 of Lecture Notes in Computer Science, page 16-29. Springer, (2005)Representation Independence and Data Abstraction.. POPL, page 263-276. ACM Press, (1986)