Author of the publication

Compositional Weak Metrics for Group Key Update.

, , and . MFCS, volume 83 of LIPIcs, page 72:1-72:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Calculus for the Analysis of Wireless Network Security Protocols., and . Formal Aspects in Security and Trust, volume 6561 of Lecture Notes in Computer Science, page 206-222. Springer, (2010)Compositional Weak Metrics for Group Key Update., , and . MFCS, volume 83 of LIPIcs, page 72:1-72:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Measuring Robustness in Cyber-Physical Systems under Sensor Attacks., , , , and . CoRR, (2024)Towards a Behavioural Theory of Access and Mobility Control in Distributed Systems., , and . FoSSaCS, volume 2620 of Lecture Notes in Computer Science, page 282-298. Springer, (2003)A bisimulation-based semantic theory of Safe Ambients., and . ACM Trans. Program. Lang. Syst., 28 (2): 290-330 (2006)Modeling Consensus in a Process Calculus., , and . CONCUR, volume 2761 of Lecture Notes in Computer Science, page 393-407. Springer, (2003)Local pi-Calculus at Work: Mobile Objects as Mobile Processes., , and . IFIP TCS, volume 1872 of Lecture Notes in Computer Science, page 390-408. Springer, (2000)Equational Reasonings in Wireless Network Gossip Protocols., , and . CoRR, (2017)A Timed Calculus for Wireless Systems., and . FSEN, volume 5961 of Lecture Notes in Computer Science, page 228-243. Springer, (2009)A Calculus of Trustworthy Ad Hoc Networks., and . Formal Aspects in Security and Trust, volume 5983 of Lecture Notes in Computer Science, page 157-172. Springer, (2009)