Peter van Rossum

According to our database1, Peter van Rossum authored at least 23 papers between 2005 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Information hiding in probabilistic concurrent systems.
Theor. Comput. Sci., 2011

2010
Dismantling SecureMemory, CryptoMemory and CryptoRF.
IACR Cryptol. ePrint Arch., 2010

Computing the Leakage of Information-Hiding Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2010

Safe Equivalences for Security Properties.
Proceedings of the Theoretical Computer Science, 2010

Modeling Privacy for Off-Line RFID Systems.
Proceedings of the Smart Card Research and Advanced Application, 2010

2009
Client-Server Password Recovery (Extended Abstract)
CoRR, 2009

Wirelessly Pickpocketing a Mifare Classic Card.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Client-Server Password Recovery.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2008
Sound and complete computational interpretation of symbolic hashes in the standard model.
Theor. Comput. Sci., 2008

Conditional Probabilities over Probabilistic and Nondeterministic Systems.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2008

Computational Soundness of Non-Malleable Commitments.
Proceedings of the Information Security Practice and Experience, 2008

Significant Diagnostic Counterexamples in Probabilistic Model Checking.
Proceedings of the Hardware and Software: Verification and Testing, 2008

Dismantling MIFARE Classic.
Proceedings of the Computer Security, 2008

2007
Probabilistic Anonymity and Admissible Schedulers
CoRR, 2007

2006
Efficient theory combination via boolean search.
Inf. Comput., 2006

Completeness of Formal Hashes in the Standard Model.
IACR Cryptol. ePrint Arch., 2006

Sound Computational Interpretation of Formal Hashes.
IACR Cryptol. ePrint Arch., 2006

Sound Computational Interpretation of Symbolic Hashes in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

2005
MathSAT: Tight Integration of SAT and Mathematical Decision Procedures.
J. Autom. Reason., 2005

An Incremental and Layered Procedure for the Satisfiability of Linear Arithmetic Logic.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2005

Provable anonymity.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

Efficient Satisfiability Modulo Theories via Delayed Theory Combination.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005



  Loading...