Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifying a signature architecture: a comparative case study., , , , and . Formal Asp. Comput., 19 (1): 63-91 (2007)Middle-Out Reasoning for Logic Program Synthesis., , and . ICLP, page 441-455. MIT Press, (1993)Enforceable Security Policies Revisited., , , and . ACM Trans. Inf. Syst. Secur., 16 (1): 3:1-3:26 (2013)Role Mining with Probabilistic Models., , and . ACM Trans. Inf. Syst. Secur., 15 (4): 15:1-15:28 (2013)The research value of publishing attacks., and . Commun. ACM, 55 (11): 22-24 (2012)Optimal Security-Aware Query Processing., and . PVLDB, 7 (12): 1307-1318 (2014)Logical-Framework-Based Program Development.. ACM Comput. Surv., 30 (3es): 1 (1998)Cryptographically Sound Theorem Proving., , , , and . IACR Cryptology ePrint Archive, (2006)Model-Driven Development of a Secure eHealth Application., , , and . Engineering Secure Future Internet Services and Systems, volume 8431 of Lecture Notes in Computer Science, Springer, (2014)The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications., , , , , , , , , and 7 other author(s). CAV, volume 3576 of Lecture Notes in Computer Science, page 281-285. Springer, (2005)