Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication Primitives for Protocol Specifications., , , and . PaCT, volume 2763 of Lecture Notes in Computer Science, page 49-65. Springer, (2003)A static analysis for Brane Calculi providing global occurrence counting information., , , , , and . Theor. Comput. Sci., (2017)True Concurrency via Abstract Interpretation., and . SAS, volume 1302 of Lecture Notes in Computer Science, page 202-216. Springer, (1997)Security Metrics at Work on the Things in IoT Systems., , , and . From Lambda Calculus to Cybersecurity Through Program Analysis, volume 12065 of Lecture Notes in Computer Science, page 233-255. Springer, (2020)Revealing the Trajectories of KLAIM Tuples, Statically., , , and . Models, Languages, and Tools for Concurrent and Distributed Programming, volume 11665 of Lecture Notes in Computer Science, page 437-454. Springer, (2019)Securing Automotive Ethernet: Design and Implementation of Security Data Link Solutions., , and . AICCSA, page 1-9. IEEE, (2023)A Flat Process Calculus for Nested Membrane Interactions., , , and . Sci. Ann. Comput. Sci., 24 (1): 91-136 (2014)Tracking Data Trajectories in IoT., and . ICISSP, page 572-579. SciTePress, (2019)The Cost of Securing IoT Communications., and . ICTCS, volume 1720 of CEUR Workshop Proceedings, page 163-176. CEUR-WS.org, (2016)A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols., , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 150-165. Springer, (2007)