From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures., , , и . ACM Conference on Computer and Communications Security, стр. 2165-2180. ACM, (2019)On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees., , , , и . ACM Conference on Computer and Communications Security, стр. 1802-1819. ACM, (2018)Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman., и . CSF, стр. 78-93. IEEE, (2019)Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions., и . EuroS&P, стр. 635-650. IEEE, (2019)Strengthening the security of authenticated key exchange against bad randomness., и . Des. Codes Cryptogr., 86 (3): 481-516 (2018)Compositionality of Security Protocols: A Research Agenda.. VODCA@FOSAD, том 142 из Electronic Notes in Theoretical Computer Science, стр. 99-110. Elsevier, (2004)Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses., , , , , и . IACR Cryptol. ePrint Arch., (2022)From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries., и . IACR Cryptol. ePrint Arch., (2009)Preface., , и . STM, том 157 из Electronic Notes in Theoretical Computer Science, стр. 1-2. Elsevier, (2005)Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries., и . CSL, том 6247 из Lecture Notes in Computer Science, стр. 1-18. Springer, (2010)