From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Symbolic Framework to Analyse Physical Proximity in Security Protocols., , и . FSTTCS, том 122 из LIPIcs, стр. 29:1-29:20. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2018)Security Analysis and Implementation of Relay-Resistant Contactless Payments., , , и . ACM Conference on Computer and Communications Security, стр. 879-898. ACM, (2020)Rewriting in Protocol Verification.. UNIF, стр. 1:1-1:1. (2020)Cracking the Stateful Nut: Computational Proofs of Stateful Security Protocols using the Squirrel Proof Assistant., , , и . CSF, стр. 289-304. IEEE, (2022)Efficient Methods to Search for Best Differential Characteristics on SKINNY., , , , , и . ACNS (2), том 12727 из Lecture Notes in Computer Science, стр. 184-207. Springer, (2021)New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks., , , и . INDOCRYPT, том 13774 из Lecture Notes in Computer Science, стр. 103-124. Springer, (2022)The Squirrel Prover and its Logic., , , , и . ACM SIGLOG News, 11 (2): 62-83 (апреля 2024)Constraint solving techniques and enriching the model with equational theories., , и . Formal Models and Techniques for Analyzing Security Protocols, том 5 из Cryptology and Information Security Series, IOS Press, (2011)Automatic Generation of Sources Lemmas in Tamarin: Towards Automatic Proofs of Security Protocols., , и . ESORICS (2), том 12309 из Lecture Notes in Computer Science, стр. 3-22. Springer, (2020)Formal Security Analysis of Widevine through the W3C EME Standard., , , , и . USENIX Security Symposium, USENIX Association, (2024)