From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cryptographically Sound Implementations for Communicating Processes., и . ICALP (2), том 4052 из Lecture Notes in Computer Science, стр. 83-94. Springer, (2006)An Asynchronous, Distributed Implementation of Mobile Ambients., , и . IFIP TCS, том 1872 из Lecture Notes in Computer Science, стр. 348-364. Springer, (2000)SecPAL: Design and semantics of a decentralized authorization language., , и . J. Comput. Secur., 18 (4): 619-665 (2010)Mobile values, new names, and secure communication., и . POPL, стр. 104-115. ACM, (2001)ACM SIGPLAN Notices 36(3), March 2001.Cryptographically sound implementations for typed information-flow security., и . POPL, стр. 323-335. ACM, (2008)A hierarchy of equivalences for asynchronous calculi., и . J. Log. Algebraic Methods Program., 63 (1): 131-173 (2005)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , и 5 other автор(ы). IACR Cryptol. ePrint Arch., (2019)Secure Implementation of Channel Abstractions., , и . LICS, стр. 105-116. IEEE Computer Society, (1998)Secure Implementations for Typed Session Abstractions., , , , и . CSF, стр. 170-186. IEEE Computer Society, (2007)Ethernet Topology Discovery without Network Assistance., , и . ICNP, стр. 328-339. IEEE Computer Society, (2004)