Author of the publication

The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement.

, , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 90-110. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering ePassport Vulnerabilities using Bisimilarity., and . CoRR, (2020)An Analytic Propositional Proof System on Graphs., , and . CoRR, (2020)SSI, from Specifications to Protocol? Formally Verify Security!, , , and . WWW, page 1620-1631. ACM, (2024)The Attacker Does not Always Hold the Initiative: Attack Trees with External Refinement., , and . GraMSec@FLoC, volume 11086 of Lecture Notes in Computer Science, page 90-110. Springer, (2018)The Sub-Additives: A Proof Theory for Probabilistic Choice extending Linear Logic.. FSCD, volume 131 of LIPIcs, page 23:1-23:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2019)A Characterisation of Open Bisimilarity using an Intuitionistic Modal Logic., , and . Log. Methods Comput. Sci., (2021)Compositional Analysis of Protocol Equivalence in the Applied π-Calculus Using Quasi-open Bisimilarity., , and . ICTAC, volume 12819 of Lecture Notes in Computer Science, page 235-255. Springer, (2021)Is Eve nearby? Analysing protocols under the distant-attacker assumption., , , , and . CSF, page 17-32. IEEE, (2022)A Graphical Proof Theory of Logical Time., , , and . FSCD, volume 228 of LIPIcs, page 22:1-22:25. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Diamonds for Security: A Non-Interleaving Operational Semantics for the Applied Pi-Calculus., , and . CONCUR, volume 243 of LIPIcs, page 30:1-30:26. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)