Author of the publication

Layered Symbolic Security Analysis in $DY^$.

, , , , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 3-21. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Back to Futures., and . CoRR, (2020)Relating Message Passing and Shared Memory, Proof-Theoretically., and . COORDINATION, volume 13908 of Lecture Notes in Computer Science, page 3-27. Springer, (2023)The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard., , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 222-242. Springer, (2023)Layered Symbolic Security Analysis in $DY^$., , , , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 3-21. Springer, (2023)A Message-Passing Interpretation of Adjoint Logic., and . PLACES@ETAPS, volume 291 of EPTCS, page 60-79. (2019)A message-passing interpretation of adjoint logic., and . J. Log. Algebraic Methods Program., (2021)Semi-Axiomatic Sequent Calculus., , and . FSCD, volume 167 of LIPIcs, page 29:1-29:22. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)