Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A card requirements language enabling privacy-preserving access control., , , , and . SACMAT, page 119-128. ACM, (2010)Deciding Security for a Fragment of ASLan.. ESORICS, volume 7459 of Lecture Notes in Computer Science, page 127-144. Springer, (2012)Verifying SeVeCom using set-based abstraction., and . IWCMC, page 1164-1169. IEEE, (2011)Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL., and . CSF, page 451-463. IEEE Computer Society, (2017)A Sound Abstraction of the Parsing Problem., and . CSF, page 259-273. IEEE Computer Society, (2014)Lazy Mobile Intruders., , and . POST, volume 7796 of Lecture Notes in Computer Science, page 147-166. Springer, (2013)Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario., , , and . FoSSaCS, volume 3921 of Lecture Notes in Computer Science, page 428-445. Springer, (2006)An On-the-Fly Model-Checker for Security Protocol Analysis., , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 253-270. Springer, (2003)Diffie-Hellman without Difficulty.. Formal Aspects in Security and Trust, volume 7140 of Lecture Notes in Computer Science, page 214-229. Springer, (2011)Sufficient conditions for vertical composition of security protocols., and . AsiaCCS, page 435-446. ACM, (2014)