Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fairness and Priority., and . Fundam. Informaticae, 22 (3): 299-306 (1995)Toward an Inductionless Technique for Proving Properties of Logic Programs., , and . ICLP, page 175-181. ADDP-GIA, (1982)Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty., , and . Protocols, Strands, and Logic, volume 13066 of Lecture Notes in Computer Science, page 124-138. Springer, (2021)MuAC: Access Control Language for Mutual Benefits., , and . ITASEC, volume 2597 of CEUR Workshop Proceedings, page 119-127. CEUR-WS.org, (2020)Control-flow Flattening Preserves the Constant-Time Policy (Extended Version)., , and . CoRR, (2020)A Formal Analysis of Complex Type Flaw Attacks on Security Protocols., , and . AMAST, volume 5140 of Lecture Notes in Computer Science, page 167-183. Springer, (2008)Typing Context-Dependent Behavioural Variation, , , and . PLACES, volume 109 of EPTCS, page 28-33. (2012)Where Do Your IoT Ingredients Come From?, , , and . COORDINATION, volume 9686 of Lecture Notes in Computer Science, page 35-50. Springer, (2016)A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols., , , and . ASIAN, volume 4846 of Lecture Notes in Computer Science, page 150-165. Springer, (2007)Transcompiling Firewalls., , , , and . POST, volume 10804 of Lecture Notes in Computer Science, page 303-324. Springer, (2018)