Author of the publication

When privacy fails, a formula describes an attack: A complete and compositional verification method for the applied π-calculus.

, , and . Theor. Comput. Sci., (May 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Analytic Propositional Proof System on Graphs., , and . CoRR, (2020)Discovering ePassport Vulnerabilities using Bisimilarity., and . CoRR, (2020)SSI, from Specifications to Protocol? Formally Verify Security!, , , and . WWW, page 1620-1631. ACM, (2024)Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity., , and . ICTAC, volume 12819 of Lecture Notes in Computer Science, page 235-255. Springer, (2021)The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement., , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 90-110. Springer, (2018)A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic., , and . Log. Methods Comput. Sci., (2021)The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic.. FSCD, volume 131 of LIPIcs, page 23:1-23:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)Diamonds for Security: A Non-Interleaving Operational Semantics for the Applied Pi-Calculus., , and . CONCUR, volume 243 of LIPIcs, page 30:1-30:26. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)A Graphical Proof Theory of Logical Time., , , and . FSCD, volume 228 of LIPIcs, page 22:1-22:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Is Eve nearby? Analysing protocols under the distant-attacker assumption., , , , and . CSF, page 17-32. IEEE, (2022)