From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Noise*: A Library of Verified High-Performance Secure Channel Protocol Implementations., , , и . SP, стр. 107-124. IEEE, (2022)Compositional Information Flow Monitoring for Reactive Programs., , и . EuroS&P, стр. 467-486. IEEE, (2022)Layered Symbolic Security Analysis in $DY^$., , , , , , , и . ESORICS (3), том 14346 из Lecture Notes in Computer Science, стр. 3-21. Springer, (2023)Automating Audit with Policy Inference., , и . CSF, стр. 1-16. IEEE, (2021)An In-Depth Symbolic Security Analysis of the ACME Standard., , , , , , и . CCS, стр. 2601-2617. ACM, (2021)First-order Gradual Information Flow Types with Gradual Guarantees., , и . CoRR, (2020)Tainted Secure Multi-Execution to Restrict Attacker Influence., , и . CCS, стр. 1732-1745. ACM, (2023)DY*: A Modular Symbolic Verification Framework for Executable Cryptographic Protocol Code., , , , , , и . EuroS&P, стр. 523-542. IEEE, (2021)Towards Usable Security Analysis Tools for Trigger-Action Programming., , , , , , , , и . SOUPS, стр. 301-320. USENIX Association, (2023)A Tutorial-Style Introduction to DY*., , , , , , и . Protocols, Strands, and Logic, том 13066 из Lecture Notes in Computer Science, стр. 77-97. Springer, (2021)