Author of the publication

Practical and Provably Secure Distance-Bounding.

, , and . ISC, volume 7807 of Lecture Notes in Computer Science, page 248-258. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Distance bounding under different assumptions: opinion., and . WiSec, page 245-248. ACM, (2019)Secure and Lightweight Distance-Bounding., , and . LightSec, volume 8162 of Lecture Notes in Computer Science, page 97-113. Springer, (2013)Automatically Verifying Expressive Epistemic Properties of Programs., , , and . AAAI, page 6245-6252. AAAI Press, (2023)Compact and Efficient UC Commitments Under Atomic-Exchanges., and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 381-401. Springer, (2014)Security Analysis and Implementation of Relay-Resistant Contactless Payments., , , and . ACM Conference on Computer and Communications Security, page 879-898. ACM, (2020)Program Semantics and Verification Technique for AI-Centred Programs., , , and . FM, volume 14000 of Lecture Notes in Computer Science, page 473-491. Springer, (2023)Optimal Proximity Proofs., and . Inscrypt, volume 8957 of Lecture Notes in Computer Science, page 170-190. Springer, (2014)Formalising Application-Driven Authentication & Access-Control based on Users' Companion Devices., , , , and . AsiaCCS, page 884-898. ACM, (2023)Extensive Security Verification of the LoRaWAN Key-Establishment: Insecurities & Patches., , , and . EuroS&P, page 425-444. IEEE, (2020)Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments., , , , and . IACR Cryptol. ePrint Arch., (2020)