1. Analysing privacy-type properties in cryptographic protocols;Delaune,2018
2. Analysing unlinkability and anonymity using the applied pi calculus;Arapinis,2010
3. Discovering ePassport vulnerabilities using bisimilarity;Horne;Log. Methods Comput. Sci.,2021
4. Analysis of an electronic voting protocol in the applied pi calculus;Kremer,2005
5. Attacking and fixing Helios: an analysis of ballot secrecy;Cortier,2011