Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

vVote: A Verifiable Voting System., , , and . ACM Trans. Inf. Syst. Secur., 18 (1): 3:1-3:30 (2015)Verifying Authentication Protocol Implementations.. FMOODS, volume 209 of IFIP Conference Proceedings, page 5-24. Kluwer, (2002)Detecting Feature Interactions in the Terrestrial Trunked Radio (TETRA) Network Using Promela and Xspin., and . SPIN, volume 1680 of Lecture Notes in Computer Science, page 136-151. Springer, (1999)vVote: a Verifiable Voting System (DRAFT)., , , and . CoRR, (2014)Automated anonymity verification of the ThreeBallot and VAV voting systems., , and . Softw. Syst. Model., 15 (4): 1049-1062 (2016)A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols., and . Formal Aspects in Security and Trust, volume 3866 of Lecture Notes in Computer Science, page 34-46. Springer, (2005)Robust Synthesis of Adversarial Visual Examples Using a Deep Image Prior., , and . BMVC, page 283. BMVA Press, (2019)A Practical Voter-Verifiable Election Scheme., , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 118-139. Springer, (2005)May Testing, Non-interference, and Compositionality.. MFCSIT, volume 40 of Electronic Notes in Theoretical Computer Science, page 361-391. Elsevier, (2000)Specifying Authentication Using Signal Events in CSP., , and . CISC, volume 3822 of Lecture Notes in Computer Science, page 63-74. Springer, (2005)