Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Existential Assertions for Voting Protocols., , and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 337-352. Springer, (2017)Bounded Version Vectors Using Mazurkiewicz Traces., , and . ACSS (1), volume 1178 of Advances in Intelligent Systems and Computing, page 31-42. Springer, (2020)Knowledge-based modelling of voting protocols., , and . TARK, page 62-71. (2007)Knowledge Transfer and Information Leakage in Protocols., , and . ATVA, volume 10482 of Lecture Notes in Computer Science, page 225-240. Springer, (2017)Tagging Makes Secrecy Decidable with Unbounded Nonces as Well., and . FSTTCS, volume 2914 of Lecture Notes in Computer Science, page 363-374. Springer, (2003)Who holds the best card? Secure communication of optimal secret bits., , , and . Australas. J Comb., (2021)Formalizing and Checking Multilevel Consistency., , , , and . VMCAI, volume 11990 of Lecture Notes in Computer Science, page 379-400. Springer, (2020)Bounded Implementations of Replicated Data Types., , and . VMCAI, volume 8931 of Lecture Notes in Computer Science, page 355-372. Springer, (2015)Dolev-Yao Theory with Associative Blindpair Operators., , and . CIAA, volume 11601 of Lecture Notes in Computer Science, page 58-69. Springer, (2019)Extending Dolev-Yao with Assertions., , and . ICISS, volume 8880 of Lecture Notes in Computer Science, page 50-68. Springer, (2014)