Author of the publication

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.

, , , and . CAV, volume 8559 of Lecture Notes in Computer Science, page 131-149. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards quantification of firewall policy complexity., , , , and . HotSoS, page 18:1-18:2. ACM, (2015)The privacy in the time of the internet: secrecy vs transparency., , , , , and . CODASPY, page 133-140. ACM, (2012)A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System., , , and . RV, volume 9333 of Lecture Notes in Computer Science, page 102-117. Springer, (2015)Insecure connection bootstrapping in cellular networks: the root of all evil., , , , and . WiSec, page 1-11. ACM, (2019)An Empirical Study of Mnemonic Sentence-based Password Generation Strategies., , , , and . ACM Conference on Computer and Communications Security, page 1216-1229. ACM, (2016)5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol., , , , and . ACM Conference on Computer and Communications Security, page 669-684. ACM, (2019)All your Credentials are Belong to Us: On Insecure WPA2-Enterprise Configurations., , , , , , , , , and . CCS, page 1100-1117. ACM, (2021)On Re-engineering the X.509 PKI with Executable Specification for Better Implementation Guarantees., , and . CCS, page 1388-1404. ACM, (2021)Toward practical authorization-dependent user obligation systems., , , , and . AsiaCCS, page 180-191. ACM, (2010)On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols., , , , and . CCS, page 603-615. ACM, (2016)