Author of the publication

Soundness and completeness of formal encryption: The cases of key cycles and partial information leakage.

, , , and . Journal of Computer Security, 17 (5): 737-797 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Some aspects of categorial semantics: sheves and glueing.. Logic Colloquium, page 281-302. Elsevier, (1985)Some Semantic Aspects of Polymorphic Lambda Calculus, and . LICS, page 315-319. IEEE Computer Society, (1987)Breaking and Fixing Public-Key Kerberos., , , , and . ASIAN, volume 4435 of Lecture Notes in Computer Science, page 167-181. Springer, (2006)Computationally sound mechanized proofs for basic and public-key Kerberos., , , and . AsiaCCS, page 87-99. ACM, (2008)A Probabilistic Poly-Time Framework for Protocol Analysis., , , and . ACM Conference on Computer and Communications Security, page 112-121. ACM, (1998)Towards an automated assistant for clinical investigations., , , , , and . IHI, page 773-778. ACM, (2012)Reduction-Based Formal Analysis of BGP Instances., , , , and . TACAS, volume 7214 of Lecture Notes in Computer Science, page 283-298. Springer, (2012)On Security Analysis of Periodic Systems: Expressiveness and Complexity., , , , , and . ICISSP, page 43-54. SCITEPRESS, (2021)A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols., , , , , and . Foundations of Security, Protocols, and Equational Reasoning, volume 11565 of Lecture Notes in Computer Science, page 192-213. Springer, (2019)Brief announcement: a calculus of policy-based routing systems., , , , and . PODC, page 343-344. ACM, (2012)