Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Security of Practical and Complete Homomorphic Encrypted Computation., and . IACR Cryptology ePrint Archive, (2016)A shallow embedding of Z in HOL., and . Inf. Softw. Technol., 37 (5-6): 269-276 (1995)Microprocessor I/O emulation facilities.. Microprocess. Microsystems, 9 (8): 386-393 (1985)More books about assembler and 16-bit micros: Krantz, D and Stanley, J68000 assembly language: techniques for building programs Addison-Wesley, Reading, MA, USA (1986) £15.95 pp 402.. Microprocess. Microsystems, 12 (2): 119 (1988)Life and work., and . The Turing Guide, Oxford University Press, (2017)POS-formal specification of a Unix tool.. Softw. Eng. J., 4 (1): 67-72 (1989)Safety-critical systems, formal methods and standards., and . Softw. Eng. J., 8 (4): 189-209 (1993)Reviews., , and . IEEE Ann. Hist. Comput., 28 (2): 77-80 (2006)Computational Culture: Transforming Archives Practice and Education for a Post-Covid World., and . ACM Journal on Computing and Cultural Heritage, 15 (3): 47:1-47:18 (2022)Z Logic and its Consequences., , and . Comput. Artif. Intell., 22 (3-4): 381-415 (2003)