Author of the publication

Guessing attacks and the computational soundness of static equivalence.

, , and . Journal of Computer Security, 18 (5): 909-968 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Panel Introduction: Varieties of Authentication., , , , , , and . CSFW, page 79-82. IEEE Computer Society, (1998)Reasoning about Secrecy for Active Networks., , and . CSFW, page 118-129. IEEE Computer Society, (2000)Moderately Hard, Memory-Bound Functions., , and . NDSS, The Internet Society, (2003)Authentication in the Taos Operating System., , and . ACM Trans. Comput. Syst., 12 (1): 3-32 (1994)Authentication in Distributed Systems: Theory and Practice., , , and . ACM Trans. Comput. Syst., 10 (4): 265-310 (1992)Authentication and Delegation with Smart-cards., , , and . TACS, volume 526 of Lecture Notes in Computer Science, page 326-345. Springer, (1991)Secrecy by Typing inSecurity Protocols.. TACS, volume 1281 of Lecture Notes in Computer Science, page 611-638. Springer, (1997)Nonclausal Temporal Deduction., and . Logic of Programs, volume 193 of Lecture Notes in Computer Science, page 1-15. Springer, (1985)An Axiomatization of Lamport's Temporal Logic of Actions.. CONCUR, volume 458 of Lecture Notes in Computer Science, page 57-69. Springer, (1990)Message-Locked Encryption for Lock-Dependent Messages., , , , and . CRYPTO (1), volume 8042 of Lecture Notes in Computer Science, page 374-391. Springer, (2013)