From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A framework for compositional verification of security protocols, , , , , и . CoRR, (2006)Abstractions for security protocol verification., , и . J. Comput. Secur., 26 (4): 459-508 (2018)A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols., , и . SP, стр. 125-141. IEEE, (2022)Complete Characterization of Security Protocols by Pattern Refinement.. Formal Protocol Verification Applied, том 07421 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters., , и . USENIX Security Symposium, стр. 1-17. USENIX Association, (2020)Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5., , и . ESORICS (1), том 10492 из Lecture Notes in Computer Science, стр. 389-407. Springer, (2017)A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols., , , , , и . IACR Cryptol. ePrint Arch., (2024)On Post-compromise Security., , и . CSF, стр. 164-178. IEEE Computer Society, (2016)Operational Semantics of Security Protocols., и . Scenarios: Models, Transformations and Tools, том 3466 из Lecture Notes in Computer Science, стр. 66-89. Springer, (2003)Keeping data secret under full compromise using porter devices., , , и . ACSAC, стр. 241-250. ACM, (2010)