Search for persons
X
?
Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation ,
2
Bounded expectations: resource analysis for probabilistic p..:
, In:
?
2017 IEEE Symposium on Security and Privacy (SP) ,
3
Verifying and Synthesizing Constant-Resource Implementation..:
, In:
?
Financial Cryptography and Data Security; Lecture Notes in Computer Science ,
9
Practical Witness-Key-Agreement for Blockchain-Based Dark P..:
, In:
?
Security Protocols XXVII; Lecture Notes in Computer Science ,
10
Affordable Security or Big Guy vs Small Guy (Transcript of ..:
, In:
?
Security Protocols XXVII; Lecture Notes in Computer Science ,
11
Affordable Security or Big Guy vs Small Guy: Does the Depth..:
, In:
?
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
12
Vision: What If They All Die? Crypto Requirements For Key P..:
, In:
?
Security Protocols XXVI; Lecture Notes in Computer Science ,
13
Non-monotonic Security Protocols and Failures in Financial ..:
, In:
?
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication ,
14