Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Authentication in the Grid: A Formal Analysis of DNP3: SAv5., , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 389-407. Springer, (2017)A framework for compositional verification of security protocols, , , , , and . CoRR, (2006)Abstractions for security protocol verification., , and . J. Comput. Secur., 26 (4): 459-508 (2018)Complete Characterization of Security Protocols by Pattern Refinement.. Formal Protocol Verification Applied, volume 07421 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)A Logic and an Interactive Prover for the Computational Post-Quantum Security of Protocols., , and . SP, page 125-141. IEEE, (2022)A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters., , and . USENIX Security Symposium, page 1-17. USENIX Association, (2020)Operational Semantics of Security Protocols., and . Scenarios: Models, Transformations and Tools, volume 3466 of Lecture Notes in Computer Science, page 66-89. Springer, (2003)On Post-compromise Security., , and . CSF, page 164-178. IEEE Computer Society, (2016)Keeping data secret under full compromise using porter devices., , , and . ACSAC, page 241-250. ACM, (2010)Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions., and . EuroS&P, page 635-650. IEEE, (2019)