Automated Reasoning for Equivalences in the Applied Pi Calculus with Barriers
Blanchet, Bruno, Smyth, Ben
Published in 2016 IEEE 29th Computer Security Foundations Symposium (CSF) (01.06.2016)
Published in 2016 IEEE 29th Computer Security Foundations Symposium (CSF) (01.06.2016)
Get full text
Conference Proceeding
Journal Article
CryptoCache: Network caching with confidentiality
Leguay, Jeremie, Paschos, Georgios S., Quaglia, Elizabeth A., Smyth, Ben
Published in 2017 IEEE International Conference on Communications (ICC) (01.05.2017)
Published in 2017 IEEE International Conference on Communications (ICC) (01.05.2017)
Get full text
Conference Proceeding
Attacking and Fixing Helios: An Analysis of Ballot Secrecy
Cortier, V., Smyth, B.
Published in 2011 IEEE 24th Computer Security Foundations Symposium (01.06.2011)
Published in 2011 IEEE 24th Computer Security Foundations Symposium (01.06.2011)
Get full text
Conference Proceeding