Author of the publication

Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or.

, , , and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 132-143. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal Analysis of E-Cash Protocols., , and . SECRYPT, page 65-75. SciTePress, (2015)A survey of algebraic properties used in cryptographic protocols., , and . Journal of Computer Security, 14 (1): 1-43 (2006)Formal verification of mobile robot protocols., , , , , and . Distributed Computing, 29 (6): 459-487 (2016)SR3: secure resilient reputation-based routing., , , and . Wireless Networks, 23 (7): 2111-2133 (2017)Implementation-Level Corruptions in Distance Bounding - Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass -., , and . IACR Cryptology ePrint Archive, (2018)Dual protocols for private multi-party matrix multiplication and trust computations., , , and . Computers & Security, (2017)Formal Verification of e-Auction Protocols., , and . POST, volume 7796 of Lecture Notes in Computer Science, page 247-266. Springer, (2013)A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol., , , , , , and . AsiaCCS, page 800-814. ACM, (2017)On Unique Decomposition of Processes in the Applied π-Calculus., , , and . FoSSaCS, volume 7794 of Lecture Notes in Computer Science, page 50-64. Springer, (2013)Defining Privacy for Weighted Votes, Single and Multi-voter Coercion., , and . ESORICS, volume 7459 of Lecture Notes in Computer Science, page 451-468. Springer, (2012)