Author of the publication

Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario.

, , , and . FoSSaCS, volume 3921 of Lecture Notes in Computer Science, page 428-445. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Polynomial Fairness and Liveness., , , and . CSFW, page 160-174. IEEE Computer Society, (2002)Anonymous Fingerprinting with Direct Non-repudiation., and . ASIACRYPT, volume 1976 of Lecture Notes in Computer Science, page 401-414. Springer, (2000)Unconditional Byzantine Agreement for any Number of Faulty Processors., and . STACS, volume 577 of Lecture Notes in Computer Science, page 339-350. Springer, (1992)A Remark on a Signature Scheme Where Forgery Can Be Proved., , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 441-445. Springer, (1990)The ESPRIT Project CAFE - High Security Digital Payment Systems., , , , , , , , , and 3 other author(s). ESORICS, volume 875 of Lecture Notes in Computer Science, page 217-230. Springer, (1994)Composable Security Analysis of OS Services., , , , , , and . IACR Cryptology ePrint Archive, (2010)Managing business health in the presence of malicious attacks., , , , , , , , and . DSN Workshops, page 9-14. IEEE Computer Society, (2011)Self-Escrowed Cash against User Blackmailing., and . Financial Cryptography, volume 1962 of Lecture Notes in Computer Science, page 42-52. Springer, (2000)Deriving Cryptographically Sound Implementations Using Composition and Formally Verified Bisimulation., , and . FME, volume 2391 of Lecture Notes in Computer Science, page 310-329. Springer, (2002)Vertrauenswürdiger Entwurf portabler Benutzerendgeräte und Sicherheitsmodule., , , and . VIS, page 329-. Vieweg, (1995)