Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Models of Circular Causality., , , and . ICDCIT, volume 8956 of Lecture Notes in Computer Science, page 1-20. Springer, (2015)Contracts as games on event structures., , , and . J. Log. Algebraic Methods Program., 85 (3): 399-424 (2016)Vicious circles in contracts and in logic., , , and . Sci. Comput. Program., (2015)SoK: Unraveling Bitcoin Smart Contracts., , , , and . POST, volume 10804 of Lecture Notes in Computer Science, page 217-242. Springer, (2018)A Contract-Oriented Middleware., , , , and . FACS, volume 9539 of Lecture Notes in Computer Science, page 86-104. Springer, (2015)Contract agreements via logic., , , and . ICE, volume 131 of EPTCS, page 5-19. (2013)A Theory of Agreements and Protection., , and . POST, volume 7796 of Lecture Notes in Computer Science, page 186-205. Springer, (2013)Circular Causality in Event Structures., , , and . Fundam. Informaticae, 134 (3-4): 219-259 (2014)A Survey of Attacks on Ethereum Smart Contracts (SoK)., , and . POST, volume 10204 of Lecture Notes in Computer Science, page 164-186. Springer, (2017)Compliance and Subtyping in Timed Session Types., , , , and . FORTE, volume 9039 of Lecture Notes in Computer Science, page 161-177. Springer, (2015)