| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2008 | Modeling Computational Security in Long-Lived Systems, Version 2 | eprint | online |
| 2 | 2007 | On the Role of Scheduling in Simulation-Based Security | eprint | online |
| 3 | 2007 | How to Model Bounded Computation in Long-Lived Systems | eprint | online |
| 4 | 2005 | Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol | eprint | online |
| 5 | 1981 | The Design and Analysis of Cryptographic Protocols | crypto | 71-72 |
Coauthors of Nancy Lynch |