Author of the publication

Mobile Subscriber WiFi Privacy.

, , and . IEEE Symposium on Security and Privacy Workshops, page 169-178. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Automated Symbolic Analysis for E-voting Protocols: A Method Based on Sufficient Conditions for Ballot Secrecy., and . CoRR, (2017)DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing., , and . SP, page 1481-1499. IEEE, (2024)Fixing the Achilles Heel of E-Voting: The Bulletin Board., , and . CSF, page 1-17. IEEE, (2021)Symbolic Analysis of Identity-Based Protocols., , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 112-134. Springer, (2019)Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol., and . USENIX Security Symposium, page 6737-6752. USENIX Association, (2023)A method for unbounded verification of privacy-type properties., , and . J. Comput. Secur., 27 (3): 277-342 (2019)A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols., , , , , and . IACR Cryptol. ePrint Arch., (2024)Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions., and . EuroS&P, page 635-650. IEEE, (2019)Symbolic Abstractions for Quantum Protocol Verification.. CoRR, (2019)Automated Verification of Privacy in Security Protocols : Back and Forth Between Theory & Practice. (Vérification automatique de la protection de la vie privée : entre théorie et pratique).. University of Paris-Saclay, France, (2017)