Author of the publication

Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage.

, , , and . Journal of Computer Security, 17 (5): 737-797 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maestro: a platform for benchmarking automatic program repair tools on software vulnerabilities., , , , and . ISSTA, page 789-792. ACM, (2022)Mignis: A Semantic Based Tool for Firewall Configuration., , , , and . CSF, page 351-365. IEEE Computer Society, (2014)A Comparative Study of Automatic Program Repair Techniques for Security Vulnerabilities., , and . ISSRE, page 196-207. IEEE, (2021)Web Platform Threats: Automated Detection of Web Security Issues With WPT., , , , , , and . USENIX Security Symposium, USENIX Association, (2024)Computational and Information-Theoretic Soundness and Completeness of Formal Encryption., , and . CSFW, page 170-184. IEEE Computer Society, (2005)Localizing Firewall Security Policies., , , and . CSF, page 194-209. IEEE Computer Society, (2016)Type-Based Analysis of Generic Key Management APIs., , and . CSF, page 97-111. IEEE Computer Society, (2013)Formal Verification of Ethereum Smart Contracts Using Isabelle/HOL., , and . Logic, Language, and Security, volume 12300 of Lecture Notes in Computer Science, page 71-97. Springer, (2020)Cookie Crumbles: Breaking and Fixing Web Session Integrity., , , and . USENIX Security Symposium, page 5539-5556. USENIX Association, (2023)Concolic Execution for WebAssembly., , , and . ECOOP, volume 222 of LIPIcs, page 11:1-11:29. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)