Up a level |
(2007) A Calculus of Challenges and Responses.
(2007) Causality-based Abstraction of Multiplicity in Security Protocols.
(2007) On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography.
(2007) Information Flow in the Peer-Reviewing Process (extended abstract).
(2007) On the Necessity of Rewinding in Secure Multiparty Computation.
(2007) Key-dependent Message Security under Active Attacks - BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles.
(2007) The Reactive Simulatability Framework for Asynchronous Systems.
(2007) On Key-dependent Encryption.
(2007) Multiparty Computation in an Asynchronous Network.
(2007) Cryptographic Soundness of Simpler Symbolic Signatures and Authentications.
(2007) LAN Crypt Gateway and Secure Browser Access.
(2007) Trust Model for eVoting.
(2007) Implementing Fuzzy Identity-Based Encryption.
(2007) Design und Implementierung eines Sync-ML Clients für das c`man-Framework für Symbian Gerät.
(2007) Mechanized verification of Security Protocols Using Causality-based Abstractions.
(2007) Enterprise Privacy Policies and Languages.
(2007) Enterprise Privacy Policies and Languages.
(2007) Causality-based Abstraction of Multiplicity in Security Protocol Analysis.
(2007) Vorgetäuscht / Böse Textdokumente -- Postscript gone wild.
(2007) On the Security of Protocols with Logarithmic Communication Complexity.