Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Equational Properties Of Mobile Ambients., and . Math. Struct. Comput. Sci., 13 (3): 371-408 (2003)SecPAL: Design and semantics of a decentralized authorization language., , and . J. Comput. Secur., 18 (4): 619-665 (2010)Spreadsheet Comprehension: Guesswork, Giving Up and Going Back to the Author., , and . CHI, page 181:1-181:21. ACM, (2021)End-User Probabilistic Programming., , , and . QEST, volume 11785 of Lecture Notes in Computer Science, page 3-24. Springer, (2019)XML Web Services: The Global Computer?. IFIP TCS, volume 223 of IFIP Conference Proceedings, page 355. Kluwer, (2002)Factoring an Adequacy Proof (Preliminary Report)., and . Functional Programming, page 9-25. Springer, (1993)Finite-Control Mobile Ambients., , and . ESOP, volume 2305 of Lecture Notes in Computer Science, page 295-313. Springer, (2002)Cryptographic Verification by Typing for a Sample Protocol Implementation., , and . FOSAD, volume 6858 of Lecture Notes in Computer Science, page 66-100. Springer, (2011)Logical Properties of Name Restriction., and . TLCA, volume 2044 of Lecture Notes in Computer Science, page 46-60. Springer, (2001)Types for Mobile Ambients., and . POPL, page 79-92. ACM, (1999)