From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Secrecy types for asymmetric communication., и . Theor. Comput. Sci., 298 (3): 387-415 (2003)Escape analysis for JavaTM: Theory and practice.. ACM Trans. Program. Lang. Syst., 25 (6): 713-775 (2003)Analyzing security protocols with secrecy types and logic programs., и . J. ACM, 52 (1): 102-146 (2005)From Secrecy to Authenticity in Security Protocols.. SAS, том 2477 из Lecture Notes in Computer Science, стр. 342-359. Springer, (2002)Security protocols: from linear to classical logic by abstract interpretation.. Inf. Process. Lett., 95 (5): 473-479 (2005)Automatic verification of correspondences for security protocols.. Journal of Computer Security, 17 (4): 363-434 (2009)Just fast keying in the pi calculus., , и . ACM Trans. Inf. Syst. Secur., 10 (3): 9 (2007)SoK: Computer-Aided Cryptography., , , , , , и . SP, стр. 777-795. IEEE, (2021)A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol., , и . EuroS&P, стр. 231-246. IEEE, (2019)Composition Theorems for CryptoVerif and Application to TLS 1.3.. CSF, стр. 16-30. IEEE Computer Society, (2018)