Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Asynchronous, Distributed Implementation of Mobile Ambients., , and . IFIP TCS, volume 1872 of Lecture Notes in Computer Science, page 348-364. Springer, (2000)Cryptographically Sound Implementations for Communicating Processes., and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 83-94. Springer, (2006)A hierarchy of equivalences for asynchronous calculi., and . J. Log. Algebraic Methods Program., 63 (1): 131-173 (2005)SecPAL: Design and semantics of a decentralized authorization language., , and . J. Comput. Secur., 18 (4): 619-665 (2010)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2019)Mobile values, new names, and secure communication., and . POPL, page 104-115. ACM, (2001)ACM SIGPLAN Notices 36(3), March 2001.Cryptographically sound implementations for typed information-flow security., and . POPL, page 323-335. ACM, (2008)Smart meter aggregation via secret-sharing., , , and . SEGS@CCS, page 75-80. ACM, (2013)Ethernet Topology Discovery without Network Assistance., , and . ICNP, page 328-339. IEEE Computer Society, (2004)Secure Implementations for Typed Session Abstractions., , , , and . CSF, page 170-186. IEEE Computer Society, (2007)