Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Abstraction and the Expressive Power of Programming Languages.. Sci. Comput. Program., 21 (2): 141-163 (1993)A Compositional Logic for Proving Security Properties of Protocols., , and . J. Comput. Secur., 11 (4): 677-722 (2003)Polymorphism and Subtyping in Interfaces., , and . Workshop on Interface Definition Languages, page 22-34. ACM Press, (1994)SIGPLAN Notices 29(8), August 1994.Assessing Function Names and Quantifying the Relationship Between Identifiers and Their Functionality to Improve Them., , and . L@S, page 291-294. ACM, (2021)Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management., , and . S&P, page 123-139. IEEE Computer Society, (2003)A Layered Architecture for Detecting Malicious Behaviors., , , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 78-97. Springer, (2008)Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods., and . WOOT, USENIX Association, (2008)The Development of Type Systems for Object-Oriented Languages., and . Theory Pract. Object Syst., 1 (3): 189-220 (1995)Security analysis of network protocols: logical and computational methods.. PPDP, page 151-152. ACM, (2005)Toward a Typed Foundation for Method Specialization and Inheritance.. POPL, page 109-124. ACM Press, (1990)