Author of the publication

From Secrecy to Authenticity in Security Protocols.

. SAS, volume 2477 of Lecture Notes in Computer Science, page 342-359. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automated Security Proofs with Sequences of Games., and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 537-554. Springer, (2006)Automatic verification of cryptographic protocols: a logic programming approach.. PPDP, page 1-3. ACM, (2003)Automatic Verification of Correspondences for Security Protocols. CoRR, (2008)Verification of Cryptographic Protocols: Tagging Enforces Termination., and . FoSSaCS, volume 2620 of Lecture Notes in Computer Science, page 136-152. Springer, (2003)Escape Analysis for Object-Oriented Languages: Application to Java.. OOPSLA, page 20-34. ACM, (1999)SIGPLAN Notices 34(10).Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif.. Found. Trends Priv. Secur., 1 (1-2): 1-135 (2016)A Static Analyzer for Large Safety-Critical Software, , , , , , , and . ACM SIGPLAN PLDI'03, 548030, page 196--207. ACM Press, (June 2003)Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach., , and . EuroS&P, page 435-450. IEEE, (2017)Analysing the HPKE Standard., , , , , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 87-116. Springer, (2021)Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage., and . SP, page 417-431. IEEE Computer Society, (2008)