Profil

GIL PONS Reynaldo

ORCID
0000-0003-1804-3319
Main Referenced Co-authors
MAUW, Sjouke  (4)
Trujillo-Rasua, Rolando (3)
BURSUC, Sergiu  (1)
Horne, Ross (1)
HORNE, Ross James  (1)
Main Referenced Keywords
Security protocols (3); Authentication (1); Bisimilarity (1); Communications protocols (1); Computational complexity (1);
Main Referenced Disciplines
Computer science (6)

Publications (total 6)

The most downloaded
173 downloads
GIL PONS, R. (2024). Analysis of security protocols with security properties based on distance [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/60069 https://hdl.handle.net/10993/60069

The most cited

1 citations (Scopus®)

BURSUC, S., GIL PONS, R., MAUW, S., & Trujillo-Rasua, R. (2024). Software-Based Memory Erasure with Relaxed Isolation Requirements. In Proceedings - 2024 IEEE 37th Computer Security Foundations Symposium, CSF 2024. IEEE Computer Society. doi:10.1109/CSF61375.2024.00022 https://hdl.handle.net/10993/62717

GIL PONS, R., Horne, R., MAUW, S., STUTZ, F., & YURKOV, S. (2026). Security Protocols and Threat Models: Security and Privacy via The Applied π-Calculus. Springer Cham. doi:10.1007/978-3-032-08249-7
Editorial reviewed

BURSUC, S., GIL PONS, R., MAUW, S., & Trujillo-Rasua, R. (2024). Software-Based Memory Erasure with Relaxed Isolation Requirements. In Proceedings - 2024 IEEE 37th Computer Security Foundations Symposium, CSF 2024. IEEE Computer Society. doi:10.1109/CSF61375.2024.00022
Peer reviewed

GIL PONS, R., Ward, M., & Miller, L. (February 2024). Finding (s,d)-hypernetworks in F-hypergraphs is NP-hard. Information Processing Letters, 184, 106433. doi:10.1016/j.ipl.2023.106433
Peer Reviewed verified by ORBi

GIL PONS, R. (2024). Analysis of security protocols with security properties based on distance [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/60069

GIL PONS, R., MAUW, S., & Trujillo-Rasua, R. (October 2023). On the optimal resistance against mafia and distance fraud in distance-bounding protocols. Computer Communications, 210, 69 - 78. doi:10.1016/j.comcom.2023.07.033
Peer Reviewed verified by ORBi

GIL PONS, R., HORNE, R. J., MAUW, S., Trujillo-Rasua, R., & Tiu, A. (2022). Is Eve nearby? Analysing protocols under the distant-attacker assumption. In IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel.
Peer reviewed

Contact ORBilu