Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Model for Formal Parametric Polymorphism: A PER Interpretation for System R., , and . TLCA, volume 902 of Lecture Notes in Computer Science, page 32-46. Springer, (1995)Software Security: A Formal Perspective - (Notes for a Talk).. FM, volume 7436 of Lecture Notes in Computer Science, page 1-5. Springer, (2012)Computer-Assisted Verification of a Protocol for Certified Email., and . SAS, volume 2694 of Lecture Notes in Computer Science, page 316-335. Springer, (2003)Computational Secrecy by Typing for the Pi Calculus., , and . APLAS, volume 4279 of Lecture Notes in Computer Science, page 253-269. Springer, (2006)An Imperative Object Calculus (Invited Paper)., and . Theory Pract. Object Syst., 1 (3): 151-166 (1995)Formal security analysis of basic network-attached storage., and . FMSE, page 43-52. ACM, (2005)Extensible Grammars for Language Specialization., , and . DBPL, page 11-31. Springer, (1993)Editorial., , and . ACM Trans. Comput. Log., 3 (3): 335-335 (2002)Perspectives on Transactional Memory., and . CONCUR, volume 5710 of Lecture Notes in Computer Science, page 1-14. Springer, (2009)Timely Rollback: Specification and Verification., and . NFM, volume 9058 of Lecture Notes in Computer Science, page 19-34. Springer, (2015)