From post

Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems.

, , , и . SC@ETAPS, том 4089 из Lecture Notes in Computer Science, стр. 34-49. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Linear capabilities for fully abstract compilation of separation-logic-verified code., , и . Proc. ACM Program. Lang., 3 (ICFP): 84:1-84:29 (2019)Abstract Congruence Criteria for Weak Bisimilarity., , , и . CoRR, (2020)An Implementation of a High Assurance Smart Meter Using Protected Module Architectures., , , , , и . WISTP, том 9895 из Lecture Notes in Computer Science, стр. 53-69. Springer, (2016)Bitsquatting: exploiting bit-flips for fun, or profit?, , , , , и . WWW, стр. 989-998. International World Wide Web Conferences Steering Committee / ACM, (2013)Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature., , , и . J. Object Technol., 3 (2): 27-35 (2004)Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals., , , и . ACM Conference on Computer and Communications Security, стр. 918-929. ACM, (2014)Practical verification of WPA-TKIP vulnerabilities., и . AsiaCCS, стр. 427-436. ACM, (2013)Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems., , , и . SC@ETAPS, том 4089 из Lecture Notes in Computer Science, стр. 34-49. Springer, (2006)Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2., и . CCS, стр. 1313-1328. ACM, (2017)Preface., , и . Sci. Comput. Program., 74 (1-2): 1 (2008)