The following pages link to Sjouke Mauw (Q395656):
Displaying 18 items.
- Privacy and verifiability in voting systems: methods, developments and trends (Q395657) (← links)
- Operational semantics and verification of security protocols. (Q610283) (← links)
- (Q701044) (redirect page) (← links)
- A hierarchy of communication models for message sequence charts (Q701045) (← links)
- Injective synchronisation: An extension of the authentication hierarchy (Q860905) (← links)
- Impossible futures and determinism (Q1607117) (← links)
- Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity (Q2119978) (← links)
- Automated identification of desynchronisation attacks on shared secrets (Q2167739) (← links)
- Task allocation in a multi-server system (Q2464397) (← links)
- A framework for compositional verification of security protocols (Q2482454) (← links)
- (Q2760256) (← links)
- (Q2779789) (← links)
- (Q2848476) (← links)
- (Q2851074) (← links)
- Attack–Defense Trees and Two-Player Binary Zero-Sum Extensive Form Games Are Equivalent (Q3056873) (← links)
- Design and analysis of dynamic leader election protocols in broadcast networks (Q5137017) (← links)
- Attack-defense trees (Q5406123) (← links)
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus (Q6041667) (← links)