Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Verification of Correspondences for Security Protocols. CoRR, (2008)A Static Analyzer for Large Safety-Critical Software, , , , , , , and . CoRR, (2007)From Computationally-Proved Protocol Specifications to Implementations and Application to SSH., and . JoWUA, 4 (1): 4-31 (2013)The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication., , and . J. ACM, 65 (1): 1:1-1:41 (2018)Design and Implementation of a Special-Purpose Static Program Analyzer for Safety-Critical Real-Time Embedded Software., , , , , , , and . The Essence of Computation, volume 2566 of Lecture Notes in Computer Science, page 85-108. Springer, (2002)Automated Formal Analysis of a Protocol for Secure File Sharing on Untrusted Storage., and . IEEE Symposium on Security and Privacy, page 417-431. IEEE Computer Society, (2008)Escape Analysis for Object-Oriented Languages: Application to Java.. OOPSLA, page 20-34. ACM, (1999)SIGPLAN Notices 34(10).Automated Security Proofs with Sequences of Games., and . CRYPTO, volume 4117 of Lecture Notes in Computer Science, page 537-554. Springer, (2006)Automatic verification of cryptographic protocols: a logic programming approach.. PPDP, page 1-3. ACM, (2003)Proving More Observational Equivalences with ProVerif., and . POST, volume 7796 of Lecture Notes in Computer Science, page 226-246. Springer, (2013)