Author of the publication

Analyzing security protocols with secrecy types and logic programs.

, and . J. ACM, 52 (1): 102-146 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Verification of Correspondences for Security Protocols. CoRR, (2008)The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication., , and . J. ACM, 65 (1): 1:1-1:41 (2018)Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif.. Found. Trends Priv. Secur., 1 (1-2): 1-135 (2016)Escape Analysis for Object-Oriented Languages: Application to Java.. OOPSLA, page 20-34. ACM, (1999)SIGPLAN Notices 34(10).Verification of Cryptographic Protocols: Tagging Enforces Termination., and . FoSSaCS, volume 2620 of Lecture Notes in Computer Science, page 136-152. Springer, (2003)Analysing the HPKE Standard., , , , , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 87-116. Springer, (2021)Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage., and . SP, page 417-431. IEEE Computer Society, (2008)Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach., , and . EuroS&P, page 435-450. IEEE, (2017)Automated Security Proofs with Sequences of Games., and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 537-554. Springer, (2006)A Static Analyzer for Large Safety-Critical Software, , , , , , , and . ACM SIGPLAN PLDI'03, 548030, page 196--207. ACM Press, (June 2003)