Up a level |
(2007) A Calculus of Challenges and Responses.
(2007) Causality-based Abstraction of Multiplicity in Security Protocol Analysis.
(2007) Causality-based Abstraction of Multiplicity in Security Protocols.
(2007) Enterprise Privacy Policies and Languages.
(2007) Enterprise Privacy Policies and Languages.
(2007) On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
(2007) Information Flow in the Peer-Reviewing Process (extended abstract).
(2007) Vorgetäuscht / Böse Textdokumente -- Postscript gone wild.
(2007) On the Necessity of Rewinding in Secure Multiparty Computation.
(2007) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
(2007) The Reactive Simulatability Framework for Asynchronous Systems.
(2007) On the Security of Protocols with Logarithmic Communication Complexity.
(2007) On Key-dependent Encryption.
(2007) Multiparty Computation in an Asynchronous Network.
(2007) Cryptographic Soundness of Simpler Symbolic Signatures and Authentications.
(2007) LAN Crypt Gateway and Secure Browser Access.
(2007) Trust Model for eVoting.
(2007) Implementing Fuzzy Identity-Based Encryption.
(2007) Design und Implementierung eines Sync-ML Clients für das c`man-Framework für Symbian Gerät.
(2007) Mechanized verification of Security Protocols Using Causality-based Abstractions.