Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verisim: Formal Analysis of Network Simulations., , , , , , and . IEEE Trans. Software Eng., 28 (2): 129-145 (2002)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2019)Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols., , and . EuroS&P, page 356-370. IEEE, (2019)Foundations of WebAssembly (Dagstuhl Seminar 23101)., , , and . Dagstuhl Reports, 13 (3): 1-16 (March 2023)Imperfect forward secrecy: how Diffie-Hellman fails in practice., , , , , , , , , and 4 other author(s). Commun. ACM, 62 (1): 106-114 (2019)Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations., , , and . SP, page 107-124. IEEE, (2022)Secure Implementations for Typed Session Abstractions., , , , and . CSF, page 170-186. IEEE Computer Society, (2007)Towards Unified Authorization for Android., and . ESSoS, volume 7781 of Lecture Notes in Computer Science, page 42-57. Springer, (2013)Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate., , and . IEEE Symposium on Security and Privacy, page 483-502. IEEE Computer Society, (2017)Cryptographic Verification by Typing for a Sample Protocol Implementation., , and . FOSAD, volume 6858 of Lecture Notes in Computer Science, page 66-100. Springer, (2011)