The following pages link to C. J. F. Cremers (Q860903):
Displayed 16 items.
- (Q488259) (redirect page) (← links)
- Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal (Q488261) (← links)
- Operational semantics and verification of security protocols. (Q610283) (← links)
- Injective synchronisation: An extension of the authentication hierarchy (Q860905) (← links)
- A formal security analysis of the Signal messaging protocol (Q2210444) (← links)
- Highly efficient key exchange protocols with optimal tightness (Q2304946) (← links)
- Strengthening the security of authenticated key exchange against bad randomness (Q2413007) (← links)
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol (Q2430140) (← links)
- A framework for compositional verification of security protocols (Q2482454) (← links)
- (Q2848476) (← links)
- Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication (Q2894318) (← links)
- ASICS: Authenticated Key Exchange Security Incorporating Certification Systems (Q2925565) (← links)
- Model Checking Security Protocols (Q3176380) (← links)
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (Q3586028) (← links)
- Comparing State Spaces in Automatic Security Protocol Analysis (Q3631370) (← links)
- CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs (Q6162061) (← links)