From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Layered Analysis of Security Ceremonies., и . SEC, том 376 из IFIP Advances in Information and Communication Technology, стр. 273-286. Springer, (2012)Soft Constraint Programming to Analysing Security Protocols., и . Theory Pract. Log. Program., 4 (5-6): 545-572 (2004)Formal Analysis of the Genetic Toggle., и . CMSB, том 5688 из Lecture Notes in Computer Science, стр. 96-110. Springer, (2009)Formal Verification of Cardholder Registration in SET., , , и . ESORICS, том 1895 из Lecture Notes in Computer Science, стр. 159-174. Springer, (2000)Lack of Explicitness Strikes Back.. Security Protocols Workshop, том 2133 из Lecture Notes in Computer Science, стр. 87-93. Springer, (2000)Smart Bulbs Can Be Hacked to Hack into Your Household., , и . SECRYPT, стр. 218-229. SCITEPRESS, (2023)Protecting Voice-Controllable Devices Against Self-Issued Voice Commands., , и . EuroS&P, стр. 160-174. IEEE, (2023)You Already Used Formal Methods but Did Not Know It.. FMTea, том 11758 из Lecture Notes in Computer Science, стр. 228-243. Springer, (2019)Papyrus-Based Safety Analysis Automatization., , и . ICSRS, стр. 469-474. IEEE, (2022)Analysing Privacy Analyses., , и . ITASEC, том 1816 из CEUR Workshop Proceedings, стр. 19-28. CEUR-WS.org, (2017)