Search for persons
X
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
2
Formalising Application-Driven Authentication & Access-Cont..:
, In:
?
2023 IEEE International Conference on Systems, Man, and Cybernetics (SMC) ,
3
Formally Verifying the Security and Privacy of an Adopted S..:
, In:
?
Formal Methods; Lecture Notes in Computer Science ,
4
Program Semantics and Verification Technique for AI-Centred..:
, In:
?
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P) ,
5
Systematic Improvement of Access-Stratum Security in Mobile..:
, In:
?
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security ,
6
The 5G Key-Establishment Stack : In-Depth Formal Verific..:
, In:
?
Security of Ubiquitous Computing Systems ,
8
From Relay Attacks to Distance-Bounding Protocols:
, In:
?
2021 IEEE 34th Computer Security Foundations Symposium (CSF) ,
9
Mechanised Models and Proofs for Distance-Bounding:
, In:
?
2020 IEEE European Symposium on Security and Privacy (EuroS&P) ,
11
Extensive Security Verification of the LoRaWAN Key-Establis..:
, In:
?
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security ,
12
Provable-Security Model for Strong Proximity-based Attacks:..:
, In:
?
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) ,
13
LURK: Server-Controlled TLS Delegation:
, In:
?
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security ,
14
Security Analysis and Implementation of Relay-Resistant Con..:
, In:
?
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems ,
15