| Publication | Date of Publication | Type |
|---|
DeepSec: deciding equivalence properties for security protocols -- improved theory and practice TheoretiCS | 2024-07-03 | Paper |
Universal Equivalence and Majority of Probabilistic Programs over Finite Fields ACM Transactions on Computational Logic | 2022-12-08 | Paper |
| When are three voters enough for privacy properties? | 2022-08-19 | Paper |
| The Hitchhiker's guide to decidability and complexity of equivalence properties in security protocols | 2021-07-08 | Paper |
Universal equivalence and majority of probabilistic programs over finite fields Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer Science | 2021-01-21 | Paper |
Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols Lecture Notes in Computer Science | 2020-08-03 | Paper |
On Communication Models When Verifying Equivalence Properties Lecture Notes in Computer Science | 2020-08-03 | Paper |
Automated verification of equivalence properties of cryptographic protocols ACM Transactions on Computational Logic | 2017-07-13 | Paper |
Composition of password-based protocols Formal Methods in System Design | 2014-06-30 | Paper |
Dynamic tags for security protocols Logical Methods in Computer Science | 2014-06-23 | Paper |
Practical Everlasting Privacy Lecture Notes in Computer Science | 2013-08-06 | Paper |
| Simulation based security in the applied pi calculus | 2012-10-24 | Paper |
Security Protocols, Constraint Systems, and Group Theories Automated Reasoning | 2012-09-05 | Paper |
| Transforming password protocols to compose | 2012-08-31 | Paper |
Reducing equational theories for the decision of static equivalence Journal of Automated Reasoning | 2012-07-17 | Paper |
Computing knowledge in security protocols under convergent equational theories Journal of Automated Reasoning | 2012-07-17 | Paper |
Automated verification of equivalence properties of cryptographic protocols Programming Languages and Systems | 2012-06-22 | Paper |
A survey of symbolic methods in computational analysis of cryptographic systems Journal of Automated Reasoning | 2011-06-03 | Paper |
Verifying privacy-type properties of electronic voting protocols: a taster Towards Trustworthy Elections | 2010-06-17 | Paper |
Reducing equational theories for the decision of static equivalence Advances in Computer Science - ASIAN 2009. Information Security and Privacy | 2010-01-14 | Paper |
Computing Knowledge in Security Protocols under Convergent Equational Theories Automated Deduction – CADE-22 | 2009-07-28 | Paper |
Computationally sound implementations of equational theories against passive adversaries Information and Computation | 2009-04-16 | Paper |
From One Session to Many: Dynamic Tags for Security Protocols Logic for Programming, Artificial Intelligence, and Reasoning | 2009-01-27 | Paper |
Proving Group Protocols Secure Against Eavesdroppers Automated Reasoning | 2008-11-27 | Paper |
Symbolic Bisimulation for the Applied Pi Calculus FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science | 2008-04-24 | Paper |
Computationally Sound Symbolic Secrecy in the Presence of Hash Functions FSTTCS 2006: Foundations of Software Technology and Theoretical Computer Science | 2008-04-17 | Paper |
Juggling with pattern matching Theory of Computing Systems | 2007-02-13 | Paper |
Formal analysis of multiparty contract signing Journal of Automated Reasoning | 2007-01-30 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Information Security and Cryptology - ICISC 2003 Lecture Notes in Computer Science | 2005-12-27 | Paper |
Financial Cryptography and Data Security Lecture Notes in Computer Science | 2005-12-22 | Paper |
Programming Languages and Systems Lecture Notes in Computer Science | 2005-09-13 | Paper |
| scientific article; zbMATH DE number 2044544 (Why is no real title available?) | 2004-02-18 | Paper |
| scientific article; zbMATH DE number 1950630 (Why is no real title available?) | 2003-07-17 | Paper |
| scientific article; zbMATH DE number 1864595 (Why is no real title available?) | 2003-02-06 | Paper |
| scientific article; zbMATH DE number 1857522 (Why is no real title available?) | 2003-01-29 | Paper |
| scientific article; zbMATH DE number 1689599 (Why is no real title available?) | 2002-01-13 | Paper |