From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , и 5 other автор(ы). IACR Cryptol. ePrint Arch., (2019)Foundations of WebAssembly (Dagstuhl Seminar 23101)., , , и . Dagstuhl Reports, 13 (3): 1-16 (марта 2023)Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols., , и . EuroS&P, стр. 356-370. IEEE, (2019)Imperfect forward secrecy: how Diffie-Hellman fails in practice., , , , , , , , , и 4 other автор(ы). Commun. ACM, 62 (1): 106-114 (2019)Secure Implementations for Typed Session Abstractions., , , , и . CSF, стр. 170-186. IEEE Computer Society, (2007)Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations., , , и . SP, стр. 107-124. IEEE, (2022)Verisim: Formal Analysis of Network Simulations., , , , , , и . IEEE Trans. Software Eng., 28 (2): 129-145 (2002)Cryptographic Verification by Typing for a Sample Protocol Implementation., , и . FOSAD, том 6858 из Lecture Notes in Computer Science, стр. 66-100. Springer, (2011)Towards Unified Authorization for Android., и . ESSoS, том 7781 из Lecture Notes in Computer Science, стр. 42-57. Springer, (2013)Verified Models and Reference Implementations for the TLS 1.3 Standard Candidate., , и . IEEE Symposium on Security and Privacy, стр. 483-502. IEEE Computer Society, (2017)