From post

Game-Based Verification of Multi-Party Contract Signing Protocols.

, , , и . Formal Aspects in Security and Trust, том 5983 из Lecture Notes in Computer Science, стр. 186-200. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Test Selection, Trace Distance and Heuristics., , , и . TestCom, том 210 из IFIP Conference Proceedings, стр. 267-282. Kluwer, (2002)Breaking Unlinkability of the ICAO 9303 Standard for e-Passports Using Bisimilarity., , , и . ESORICS (1), том 11735 из Lecture Notes in Computer Science, стр. 577-594. Springer, (2019)Security Protocols for Secret Santa., , и . Security Protocols Workshop, том 7061 из Lecture Notes in Computer Science, стр. 175-184. Springer, (2010)Generalizing Multi-party Contract Signing., и . POST, том 9036 из Lecture Notes in Computer Science, стр. 156-175. Springer, (2015)MSC and data: dynamic variables., , и . SDL Forum, стр. 105-. Elsevier, (1999)A Process Specification Formalism Based on Static COLD., , , и . Algebraic Methods, том 490 из Lecture Notes in Computer Science, стр. 303-335. Springer, (1989)Selective Location Blinding Using Hash Chains., , и . Security Protocols Workshop, том 7114 из Lecture Notes in Computer Science, стр. 132-141. Springer, (2011)When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus., , и . Theor. Comput. Sci., (мая 2023)A framework for compositional verification of security protocols., , , , , и . Inf. Comput., 206 (2-4): 425-459 (2008)Bridging Two Worlds: Reconciling Practical Risk Assessment Methodologies with Theory of Attack Trees., , , , и . GraMSec@CSF, том 9987 из Lecture Notes in Computer Science, стр. 80-93. Springer, (2016)