Author of the publication

The Code That Never Ran: Modeling Attacks on Speculative Evaluation.

, , , and . IEEE Symposium on Security and Privacy, page 1238-1255. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Translating Timed Process Algebra into Prioritized Process Algebra.. FTRTFT, volume 571 of Lecture Notes in Computer Science, page 493-506. Springer, (1992)Allegories of Circuits., and . LFCS, volume 813 of Lecture Notes in Computer Science, page 56-68. Springer, (1994)Integrity Constraints for Linked Data., and . Description Logics, volume 745 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)A Fully Abstract Semantics for a Concurrent Functional Language with Monadic Types. LICS, page 255-264. IEEE Computer Society, (1995)Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus., and . CONCUR, volume 3653 of Lecture Notes in Computer Science, page 186-201. Springer, (2005)Typing One-to-One and One-to-Many Correspondences in Security Protocols., and . ISSS, volume 2609 of Lecture Notes in Computer Science, page 263-282. Springer, (2002)Types and Effects for Asymmetric Cryptographic Protocols., and . CSFW, page 77-91. IEEE Computer Society, (2002)Robin Milner 1934--2010: verification, languages, and concurrency., , , , and . POPL, page 473-474. ACM, (2011)The Lax Braided Structure of Streaming I/O., and . CSL, volume 12 of LIPIcs, page 292-306. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2011)Artifact: Privacy-Respecting Type Error Telemetry at Scale., , , and . (December 2023)