Title |
Conference |
Tags |
A Formal Analysis of IEEE 802.11's WPA2: Countering the Kracks Caused by Cracking the Counters |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
A Spectral Analysis of Noise: A Comprehensive, Automated, Formal Analysis of Diffie-Hellman Protocols |
29thUSENIXSecuritySymposium-2020 - Berkeley, USA |
|
Improving Automated Symbolic Analysis of Ballot Secrecy for E-voting Protocols: A Method Based on Sufficient Conditions |
IEEEEuroS&P-2019 - Stockholm, Sweden |
|
A Formal Security Analysis of the Signal Messaging Protocol |
EuroSP-2017 - paris,france |
|
A Formal Security Analysis of the Signal Messaging Protocol |
RWC-2017 - new york city,usa |
|
Automated Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication |
RWC-2016 - stanford,usa |
|
Contributed talk 2: Improving the ISO/IEC 11770 Standard for Key Management Techniques. |
SSR-2014 - London,UK |
|
Panel Session :Formal Verification and Analysis of Protocols in Standards Development and Evolution |
SSR-2014 - London,UK |
|
ARPKI: Attack Resilient Public-Key Infrastructure |
CCS-2014 - Scottsdale,USA |
|
Automated Analysis of Diffie-Hellman Protocols and Advanced Security Properties |
25th IEEE Computer Security Foundations Symposium-2012 - Cambridge, MA, USA |
|