Personensuche
X
?
Proceedings of the ACM on Web Conference 2024 ,
1
SSI, from Specifications to Protocol? Formally Verify Secur..:
, In:
?
Chatbot Research and Design; Lecture Notes in Computer Science ,
2
Language Ideology Bias in Conversational Technology:
, In:
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
3
Formal Verification and Solutions for Estonian E-Voting:
, In:
?
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security ,
4
Provably Unlinkable Smart Card-based Payments:
, In:
?
2023 IEEE 36th Computer Security Foundations Symposium (CSF) ,
5
Election Verifiability in Receipt-Free Voting Protocols:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
6
Contingent payments from two-party signing and verification..:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
7
Is Eve nearby? Analysing protocols under the distant-attack..:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
8
Unlinkability of an Improved Key Agreement Protocol for EMV..:
, In:
?
2022 IEEE 35th Computer Security Foundations Symposium (CSF) ,
9
Contingent payments from two-party signing and verification..:
, In:
?
Electronic Voting; Lecture Notes in Computer Science ,
10
Provably Improving Election Verifiability in Belenios:
, In:
?
Theoretical Aspects of Computing – ICTAC 2021; Lecture Notes in Computer Science ,
11
Compositional Analysis of Protocol Equivalence in the Appli..:
, In:
?
Disinformation in Open Online Media; Lecture Notes in Computer Science ,
12
Examining Linguistic Biases in Telegram with a Game Theoret..:
, In:
?
2021 IEEE 34th Computer Security Foundations Symposium (CSF) ,
13
Election Verifiability Revisited: Automated Security Proofs..:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
14
ÆGIS: Shielding Vulnerable Smart Contracts Against Attacks:
, In:
?
Graphical Models for Security; Lecture Notes in Computer Science ,
15