GIL PONS, R., Horne, R., MAUW, S., STUTZ, F., & YURKOV, S. (2026). Security Protocols and Threat Models: Security and Privacy via The Applied π-Calculus. Springer Cham. doi:10.1007/978-3-032-08249-7 Editorial reviewed |
![]() | BURSUC, S., GIL PONS, R., MAUW, S., & Trujillo-Rasua, R. (2024). Software-Based Memory Erasure with Relaxed Isolation Requirements. In Proceedings - 2024 IEEE 37th Computer Security Foundations Symposium, CSF 2024. IEEE Computer Society. doi:10.1109/CSF61375.2024.00022 Peer reviewed |
![]() | GIL PONS, R., Ward, M., & Miller, L. (February 2024). Finding (s,d)-hypernetworks in F-hypergraphs is NP-hard. Information Processing Letters, 184, 106433. doi:10.1016/j.ipl.2023.106433 Peer Reviewed verified by ORBi |
![]() | GIL PONS, R. (2024). Analysis of security protocols with security properties based on distance [Doctoral thesis, Unilu - University of Luxembourg]. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/60069 |
![]() | GIL PONS, R., MAUW, S., & Trujillo-Rasua, R. (October 2023). On the optimal resistance against mafia and distance fraud in distance-bounding protocols. Computer Communications, 210, 69 - 78. doi:10.1016/j.comcom.2023.07.033 Peer Reviewed verified by ORBi |
![]() | GIL PONS, R., HORNE, R. J., MAUW, S., Trujillo-Rasua, R., & Tiu, A. (2022). Is Eve nearby? Analysing protocols under the distant-attacker assumption. In IEEE Computer Security Foundations Symposium, August 7 - 10, 2022, Haifa, Israel. Peer reviewed |