Publication | Date of Publication | Type |
---|
Synthesizing different development paradigms: Combining top-down with bottom-up reasoning about distributed systems | 2017-01-19 | Paper |
Automated proofs of block cipher modes of operation | 2016-05-26 | Paper |
On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus | 2015-12-15 | Paper |
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols | 2015-09-30 | Paper |
Verifying untimed and timed aspects of the experimental batch plant | 2014-08-07 | Paper |
Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions | 2013-12-13 | Paper |
CIL Security Proof for a Password-Based Key Exchange | 2013-10-23 | Paper |
Formal Verification of e-Auction Protocols | 2013-08-06 | Paper |
Networks of Processes with Parameterized State Space | 2013-05-10 | Paper |
On Unique Decomposition of Processes in the Applied π-Calculus | 2013-03-18 | Paper |
Automated Verification of Block Cipher Modes of Operation, an Improved Method | 2012-06-08 | Paper |
A Computational Indistinguishability Logic for the Bounded Storage Model | 2012-06-08 | Paper |
Vote-Independence: A Powerful Privacy Notion for Voting Protocols | 2012-06-08 | Paper |
Certified Security Proofs of Cryptographic Protocols in the Computational Model: An Application to Intrusion Resilience | 2011-11-22 | Paper |
Automated proofs for asymmetric encryption | 2011-06-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3002509 | 2011-05-20 | Paper |
Beyond Provable Security Verifiable IND-CCA Security of OAEP | 2011-02-11 | Paper |
On the Equality of Probabilistic Terms | 2011-01-07 | Paper |
Verification: Theory and Practice | 2010-03-23 | Paper |
Automated Proofs for Asymmetric Encryption | 2010-03-09 | Paper |
Automated Security Proof for Symmetric Encryption Modes | 2010-01-14 | Paper |
Formal Indistinguishability Extended to the Random Oracle Model | 2009-10-16 | Paper |
Flat Parametric Counter Automata | 2009-06-23 | Paper |
A Generalization of DDH with Applications to Protocol Analysis and Computational Soundness | 2009-03-10 | Paper |
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption | 2008-04-24 | Paper |
Foundations of Software Science and Computation Structures | 2007-09-28 | Paper |
Flat Parametric Counter Automata | 2007-09-11 | Paper |
A symbolic decision procedure for cryptographic protocols with time stamps | 2005-10-07 | Paper |
Programming Languages and Systems | 2005-09-13 | Paper |
Static Analysis | 2005-08-24 | Paper |
CONCUR 2004 - Concurrency Theory | 2005-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4817540 | 2004-09-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4737006 | 2004-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4417934 | 2003-07-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4782048 | 2003-04-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4779118 | 2003-02-25 | Paper |
Iterating transducers | 2003-02-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4551159 | 2002-09-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q2766662 | 2002-06-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q2768503 | 2002-02-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q2709807 | 2001-08-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q2722048 | 2001-07-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q4518895 | 2001-02-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4952305 | 2000-05-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q4341644 | 1997-06-17 | Paper |
Metric temporal logic with durations | 1997-02-28 | Paper |