Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Provably Unlinkable Smart Card-based Payments., , , and . CCS, page 1392-1406. ACM, (2023)Constructing weak simulations from linear implications for processes with private names., and . Math. Struct. Comput. Sci., 29 (8): 1275-1308 (2019)Extracting Threshold Conceptual Structures from Web Documents., , and . ICCS, volume 8577 of Lecture Notes in Computer Science, page 130-144. Springer, (2014)Brewer-Nash Scrutinised: Mechanised Checking of Policies Featuring Write Revocation., , , and . CSF, page 112-126. IEEE, (2024)An Analytic Propositional Proof System on Graphs., , and . CoRR, (2020)Discovering ePassport Vulnerabilities using Bisimilarity., and . CoRR, (2020)SSI, from Specifications to Protocol? Formally Verify Security!, , , and . WWW, page 1620-1631. ACM, (2024)A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic., , and . Log. Methods Comput. Sci., (2021)Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity., , and . ICTAC, volume 12819 of Lecture Notes in Computer Science, page 235-255. Springer, (2021)The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement., , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 90-110. Springer, (2018)