Jacomme, Charlie
84  Ergebnisse:
Personensuche X
?
 
?
2

Subterm-Based Proof Techniques for Improving the Automation..:

, In: 2023 IEEE 36th Computer Security Foundations Symposium (CSF),
Cremers, Cas ; Jacomme, Charlie ; Lukert, Philip - p. 200-213 , 2023
 
?
3

A Logic and an Interactive Prover for the Computational Pos..:

, In: 2022 IEEE Symposium on Security and Privacy (SP),
 
?
4

An Extensive Formal Analysis of Multi-factor Authentication..:

Jacomme, Charlie ; Kremer, Steve
ACM Transactions on Privacy and Security.  24 (2021)  2 - p. 1-34 , 2021
 
?
5

An Interactive Prover for Protocol Verification in the Comp..:

, In: 2021 IEEE Symposium on Security and Privacy (SP),
 
?
6

An Extensive Formal Analysis of Multi-factor Authentication..:

Jacomme, Charlie ; Kremer, Steve
ACM Transactions on Privacy and Security (TOPS).  24 (2021)  2 - p. 1-34 , 2021
 
?
7

Universal Equivalence and Majority of Probabilistic Program..:

Barthe, Gilles ; Jacomme, Charlie ; Kremer, Steve
ACM Transactions on Computational Logic.  23 (2021)  1 - p. 1-42 , 2021
 
?
8

Universal equivalence and majority of probabilistic program..:

, In: Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science,
 
?
9

Oracle Simulation: A Technique for Protocol Composition wit..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
 
?
10

Symbolic Proofs for Lattice-Based Cryptography:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Barthe, Gilles ; Fan, Xiong ; Gancher, Joshua... - p. 538-555 , 2018
 
?
11

Symbolic Models for Isolated Execution Environments:

, In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P),
 
1-15