Author of the publication

Optimizing Protocol Rewrite Rules of CIL Specifications.

, , , and . CSFW, page 52-62. IEEE Computer Society, (2000)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Narrowing terminates for encryption., and . CSFW, page 39-. IEEE Computer Society, (1996)Efficient fault-tolerant certificate revocation., , and . ACM Conference on Computer and Communications Security, page 19-24. ACM, (2000)Security for object-oriented database systems., and . S&P, page 260-272. IEEE Computer Society, (1992)The Interrogator: A Tool for Cryptographic Protocol Security.. S&P, page 134-141. IEEE Computer Society, (1984)Protocol-Independent Secrecy., and . S&P, page 110-119. IEEE Computer Society, (2000)Covert Channel Capacity.. S&P, page 60-66. IEEE Computer Society, (1987)Symbolic Protocol Analysis with Products and Diffie-Hellman Exponentiation., and . CSFW, page 47-61. IEEE Computer Society, (2003)Example of a formal flow violation.. COMPSAC, page 204-208. IEEE, (1978)Microtext: the design of a microprogrammed finite state search machine for full-text retrieval., and . AFIPS Fall Joint Computing Conference (1), volume 41 of AFIPS Conference Proceedings, page 479-488. AFIPS / ACM / Thomson Book Company, Washington D.C., (1972)A resource allocation model for denial of service.. S&P, page 137-147. IEEE Computer Society, (1992)