Personensuche
X
?
2023 IEEE Symposium on Security and Privacy (SP) ,
2
Sound Verification of Security Protocols: From Design to In..:
, In:
?
2023 38th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS) ,
3
A Higher-Order Indistinguishability Logic for Cryptographic..:
, In:
?
Computer Security – ESORICS 2022; Lecture Notes in Computer Science ,
4
One Vote Is Enough for Analysing Privacy:
, In:
?
2021 IEEE Symposium on Security and Privacy (SP) ,
5
A Security Model and Fully Verified Implementation for the ..:
, In:
?
2020 IEEE 33rd Computer Security Foundations Symposium (CSF) ,
6
Fifty Shades of Ballot Privacy: Privacy against a Malicious..:
, In:
?
Lecture Notes in Computer Science; Principles of Security and Trust ,
7
Equivalence Properties by Typing in Cryptographic Branching..:
, In:
?
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security ,
8
Voting : You Can't Have Privacy without Individual Verif..:
, In:
?
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security ,
9
A Type System for Privacy Properties:
, In:
?
2017 IEEE European Symposium on Security and Privacy (EuroS&P) ,
10