Author of the publication

A Specification Logic for Programs in the Probabilistic Guarded Command Language.

, , , and . ICTAC, volume 13572 of Lecture Notes in Computer Science, page 369-387. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Privacy Policies to Enhance Informed Consent (Extended Version)., and . CoRR, (2019)A Specification Logic for Programs in the Probabilistic Guarded Command Language (Extended Version)., , , and . CoRR, (2022)Privacy with Good Taste - A Case Study in Quantifying Privacy Risks in Genetic Scores., , , , , , , and . DPM/CBT@ESORICS, volume 13619 of Lecture Notes in Computer Science, page 103-119. Springer, (2022)Computational analysis of Canny & Binary Fuzzy Rough Set model based on Triangle Modulus Edge Detectors., and . ICCI*CC, page 305-312. IEEE Computer Society, (2012)SoK: Three Facets of Privacy Policies., and . WPES@CCS, page 41-56. ACM, (2020)GPU Powered ROSA Analyzer., , and . ICPP, page 901-908. IEEE Computer Society, (2013)Privug: Quantifying Leakage using Probabilistic Programming for Privacy Risk Analysis., , , and . CoRR, (2020)Analysis of Privacy Policies to Enhance Informed Consent., and . DBSec, volume 11559 of Lecture Notes in Computer Science, page 177-198. Springer, (2019)How Attacker Knowledge Affects Privacy Risks: An Analysis Using Probabilistic Programming., , , , and . IWSPA@CODASPY, page 55-65. ACM, (2022)Privug: Using Probabilistic Programming for Quantifying Leakage in Privacy Risk Analysis., , , and . ESORICS (2), volume 12973 of Lecture Notes in Computer Science, page 417-438. Springer, (2021)