Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Logic in Access Control (Tutorial Notes).. FOSAD, volume 5705 of Lecture Notes in Computer Science, page 145-165. Springer, (2009)Prudent engineering practice for cryptographic protocols., and . S&P, page 122-136. IEEE Computer Society, (1994)Secure Implementation of Channel Abstractions., , and . LICS, page 105-116. IEEE Computer Society, (1998)The Existence of Refinement Mappings, and . LICS, page 165-175. IEEE Computer Society, (1988)Reasoning about Cryptographic Protocols in the Spi Calculus., and . CONCUR, volume 1243 of Lecture Notes in Computer Science, page 59-73. Springer, (1997)Deciding Knowledge in Security Protocols under (Many More) Equational Theories., and . CSFW, page 62-76. IEEE Computer Society, (2005)On the Protection of Private Information in Machine Learning Systems: Two Recent Approches., , , , , , , and . CSF, page 1-6. IEEE Computer Society, (2017)XFI: Software Guards for System Address Spaces., , , , and . OSDI, page 75-88. USENIX Association, (2006)Host Fingerprinting and Tracking on the Web: Privacy and Security Implications., , , , and . NDSS, The Internet Society, (2012)Control-flow integrity., , , and . CCS, page 340-353. ACM, (2005)