From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Analyse des protocoles cryptographiques: des modèles symboliques aux modèles calculatoires. (Analysis of cryptographic protocols: from symbolic to computational models).. (2009)A Formal Analysis of the Neuchatel e-Voting Protocol., , и . EuroS&P, стр. 430-442. IEEE, (2018)Electronic Voting: How Logic Can Help.. CIAA, том 10329 из Lecture Notes in Computer Science, стр. xi-xii. Springer, (2017)Introduction., и . Formal Models and Techniques for Analyzing Security Protocols, том 5 из Cryptology and Information Security Series, IOS Press, (2011)A Type System for Privacy Properties., , , и . CCS, стр. 409-423. ACM, (2017)A small bound on the number of sessions for security protocols., , и . CSF, стр. 33-48. IEEE, (2022)Computationally Sound Symbolic Secrecy in the Presence of Hash Functions., , , и . FSTTCS, том 4337 из Lecture Notes in Computer Science, стр. 176-187. Springer, (2006)Formal Models and Techniques for Analyzing Security Protocols: A Tutorial., и . Found. Trends Program. Lang., 1 (3): 151-267 (2014)A Type System for Privacy Properties (Technical Report)., , , и . CoRR, (2017)BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device., , и . CSF, стр. 367-381. IEEE, (2019)