From post

Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus.

, , и . Formal Aspects in Security and Trust, том 6561 из Lecture Notes in Computer Science, стр. 223-238. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols., , , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 469-488. Springer, (2017)Quantitative Explainable AI For Face Recognition., , и . ICECCS, стр. 32-41. IEEE, (2023)Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus., , и . Formal Aspects in Security and Trust, том 6561 из Lecture Notes in Computer Science, стр. 223-238. Springer, (2010)Callback2Vec: Callback-aware hierarchical embedding for mobile application., , , , и . Inf. Sci., (2021)An Analytics Framework for Heuristic Inference Attacks against Industrial Control Systems., , , , , и . TrustCom, стр. 827-835. IEEE, (2020)Deep Review Sharing., , , , , , , и . SANER, стр. 61-72. IEEE, (2019)A Verification Framework for Stateful Security Protocols., , , , , , и . ICFEM, том 10610 из Lecture Notes in Computer Science, стр. 262-280. Springer, (2017)The Foul Adversary: Formal Models., и . ICFEM, том 11232 из Lecture Notes in Computer Science, стр. 37-53. Springer, (2018)Formal Analysis of Privacy in an eHealth Protocol., , и . ESORICS, том 7459 из Lecture Notes in Computer Science, стр. 325-342. Springer, (2012)A Framework for Formal Analysis of Privacy on SSO Protocols., , , и . SecureComm, том 238 из Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, стр. 763-777. Springer, (2017)