Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Massive Open Online Courses: Current State and Perspectives (Dagstuhl Perspectives Workshop 14112)., , , , and . Dagstuhl Manifestos, 4 (1): 1-27 (2014)Polymorphic Type Inference and Containment. Inf. Comput., 76 (2/3): 211-249 (February 1988)A derivation system and compositional logic for security protocols., , , and . Journal of Computer Security, 13 (3): 423-482 (2005)Inductive trace properties for computational security., , , and . Journal of Computer Security, 18 (6): 1035-1073 (2010)Security Analysis and Improvements for IEEE 802.11i., and . NDSS, The Internet Society, (2005)Client-Side Defense Against Web-Based Identity Theft., , , and . NDSS, The Internet Society, (2004)Securing Java RMI-Based Distributed Applications., , and . ACSAC, page 262-271. IEEE Computer Society, (2004)Semantic Models for Second-Order Lambda Calculus. FOCS, page 289-299. IEEE Computer Society, (1984)How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation., , , , and . IEEE Symposium on Security and Privacy, page 399-413. IEEE Computer Society, (2010)State of the Art: Automated Black-Box Web Application Vulnerability Testing., , , and . IEEE Symposium on Security and Privacy, page 332-345. IEEE Computer Society, (2010)