From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

On the Existence of an Effective and Complete Inference System for Cryptographic Protocols., , и . FoSSaCS, том 2987 из Lecture Notes in Computer Science, стр. 42-57. Springer, (2004)HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols., , и . CAV, том 2725 из Lecture Notes in Computer Science, стр. 219-222. Springer, (2003)Basic Principles of a textbook on the compositional and noncompositional verification of concurrent programs., , , , , , и . FBT, стр. 3-5. Verlag Shaker, (2000)A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness., , , и . CRYPTO, том 4622 из Lecture Notes in Computer Science, стр. 482-499. Springer, (2007)CIL Security Proof for a Password-Based Key Exchange., , и . ProvSec, том 8209 из Lecture Notes in Computer Science, стр. 59-85. Springer, (2013)Completing the Picture: Soundness of Formal Encryption in the Presence of Active Adversaries., , и . ESOP, том 3444 из Lecture Notes in Computer Science, стр. 172-185. Springer, (2005)Formal Methods and Tools: Introduction and Overview., , и . Tool Support for System Specification, Development and Verification, стр. 1-17. Springer, (1998)Temporal Logic + Timed Automata: Expressiveness and Decidability., и . CONCUR, том 962 из Lecture Notes in Computer Science, стр. 531-545. Springer, (1995)On Unique Decomposition of Processes in the Applied π-Calculus., , , и . FoSSaCS, том 7794 из Lecture Notes in Computer Science, стр. 50-64. Springer, (2013)Formal Indistinguishability Extended to the Random Oracle Model., , и . ESORICS, том 5789 из Lecture Notes in Computer Science, стр. 555-570. Springer, (2009)