CryptoBap: A Binary Analysis Platform for Cryptographic ProtocolsConference on Computer and Communications Security (CCS), 2023 |
A formal methodology for integral security design and verification of
network protocolsJournal of Systems and Software (JSS), 2012 |
Satisfiability of General Intruder Constraints with and without a Set
ConstructorJournal of symbolic computation (JSC), 2011 |
An Epistemic Approach to Coercion-Resistance for Electronic Voting
ProtocolsIEEE Symposium on Security and Privacy (IEEE S&P), 2009 |