Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Program Logics - for Certified Compilers.. Cambridge University Press, (2014)Proof-Carrying Authentication., and . ACM Conference on Computer and Communications Security, page 52-62. ACM, (1999)Separate Compilation for Standard ML., and . PLDI, page 13-23. ACM, (1994)Using Memory Errors to Attack a Virtual Machine., and . S&P, page 154-165. IEEE Computer Society, (2003)Standard ML of New Jersey., and . PLILP, volume 528 of Lecture Notes in Computer Science, page 1-13. Springer, (1991)Runtime Tags Aren't Necessary.. LISP Symb. Comput., 2 (2): 153-162 (1989)Mostly Sound Type System Improves a Foundational Program Verifier., and . CPP, volume 8307 of Lecture Notes in Computer Science, page 17-32. Springer, (2013)Shrink fast correctly!, and . PPDP, page 49-60. ACM, (2017)Type-preserving garbage collectors., and . POPL, page 166-178. ACM, (2001)ACM SIGPLAN Notices 36(3), March 2001.How to defeat Rivest's ThreeBallot Voting System. (2007)Unpublished.