Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The verification of an industrial payment protocol: the SET purchase phase., , and . ACM Conference on Computer and Communications Security, page 12-20. ACM, (2002)Three Years of Experience with Sledgehammer, a Practical Link between Automatic and Interactive Theorem Provers.. PAAR@IJCAR, volume 9 of EPiC Series in Computing, page 1-10. EasyChair, (2010)Bayesian Optimisation for Premise Selection in Automated Theorem Proving (Student Abstract)., , , , and . AAAI, page 13919-13920. AAAI Press, (2020)A compiler generator for semantic grammars.. Stanford University, USA, (1981)ML for the working programmer.. Cambridge University Press, (1991)Is the Verification Problem for Cryptographic Protocols Solved?., , and . Security Protocols Workshop, volume 3364 of Lecture Notes in Computer Science, page 183-189. Springer, (2003)Verifying Second-Level Security Protocols., , and . TPHOLs, volume 2758 of Lecture Notes in Computer Science, page 352-366. Springer, (2003)Counting polynomial roots in isabelle/hol: a formal proof of the budan-fourier theorem., and . CPP, page 52-64. ACM, (2019)Making Sense of Specifications: The Formalization of SET (Transcript of Discussion).. Security Protocols Workshop, volume 2133 of Lecture Notes in Computer Science, page 82-86. Springer, (2000)Deriving Structural Induction in LCF.. Semantics of Data Types, volume 173 of Lecture Notes in Computer Science, page 197-214. Springer, (1984)