Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Operational Semantics of Security Protocols., and . Scenarios: Models, Transformations and Tools, volume 3466 of Lecture Notes in Computer Science, page 66-89. Springer, (2003)Keeping data secret under full compromise using porter devices., , , and . ACSAC, page 241-250. ACM, (2010)A framework for compositional verification of security protocols, , , , , and . CoRR, (2006)A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters., , and . USENIX Security Symposium, page 1-17. USENIX Association, (2020)Abstractions for security protocol verification., , and . J. Comput. Secur., 26 (4): 459-508 (2018)Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5., , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 389-407. Springer, (2017)Complete Characterization of Security Protocols by Pattern Refinement.. Formal Protocol Verification Applied, volume 07421 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols., , and . SP, page 125-141. IEEE, (2022)On Post-compromise Security., , and . CSF, page 164-178. IEEE Computer Society, (2016)A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols., , , , , and . IACR Cryptol. ePrint Arch., (2024)