Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Truderung, Tomasz
add a person with the name Truderung, Tomasz
 

Other publications of authors with the same name

An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols, and . CoRR, (2009)Clash Attacks on the Verifiability of E-Voting Systems., , and . IACR Cryptology ePrint Archive, (2012)Security in e-voting., and . it - Information Technology, 56 (6): 300-306 (2014)Extending and Applying a Framework for the Cryptographic Verification of Java Programs., , , and . POST, volume 8414 of Lecture Notes in Computer Science, page 220-239. Springer, (2014)Reducing Protocol Analysis with XOR to the XOR-Free Case in the Horn Theory Based Approach., and . J. Autom. Reasoning, 46 (3-4): 325-352 (2011)Set Constraints on Regular Terms., and . CSL, volume 3210 of Lecture Notes in Computer Science, page 458-472. Springer, (2004)A Formal Definition of Online Abuse-Freeness., , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 484-497. Springer, (2010)Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking., , and . IACR Cryptology ePrint Archive, (2014)Optimal Complexity Bounds for Positive LTL Games., and . CSL, volume 2471 of Lecture Notes in Computer Science, page 262-275. Springer, (2002)Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach., and . ACM Conference on Computer and Communications Security, page 129-138. ACM, (2008)