Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated algebraic analysis of structure-preserving signature schemes.. IACR Cryptology ePrint Archive, (2014)Relay Cost Bounding for Contactless EMV Payments., , , , and . Financial Cryptography, volume 8975 of Lecture Notes in Computer Science, page 189-206. Springer, (2015)The SmartLogic Tool: Analysing and Testing Smart Card Protocols., and . ICST, page 864-871. IEEE Computer Society, (2012)Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws., , and . IEEE Symposium on Security and Privacy Workshops, page 125-133. IEEE Computer Society, (2015)TRAKS: A Universal Key Management Scheme for ERTMS., , , and . ACSAC, page 327-338. ACM, (2017)Model learning and model checking of SSH implementations., , , , , and . SPIN, page 142-151. ACM, (2017)Is Java Card Ready for Hash-Based Signatures?, , , , , and . IWSEC, volume 11049 of Lecture Notes in Computer Science, page 127-142. Springer, (2018)Protocol State Fuzzing of TLS Implementations., and . USENIX Security Symposium, page 193-206. USENIX Association, (2015)Polymorphic Encryption and Pseudonymisation for Personalised Healthcare., , , , and . IACR Cryptology ePrint Archive, (2016)UDM: Private user discovery with minimal information disclosure., , , and . Cryptologia, 46 (4): 347-379 (2022)