From post

The Operational Semantics of a Java Secure Processor.

, , и . Formal Syntax and Semantics of Java, том 1523 из Lecture Notes in Computer Science, стр. 313-352. Springer, (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

StreamTo: Streaming Content using a Tamper-Resistant Token., , , , , и . SEC, том 181 из IFIP, стр. 601-612. Springer, (2005)Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow., , и . FMCAD, стр. 1-10. IEEE, (2008)Workload-based configuration of MEMS-based storage devices for mobile systems., , и . EMSOFT, стр. 41-50. ACM, (2008)Power management of MEMS-based storage devices for mobile systems., и . CASES, стр. 245-254. ACM, (2008)Performance of Lazy Combinator Graph Reduction.. Softw. Pract. Exp., 21 (3): 299-329 (1991)A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations., и . Java Card Workshop, том 2041 из Lecture Notes in Computer Science, стр. 52-72. Springer, (2000)Basic Proof Skills of Computer Science Students., , и . FPLE, том 1022 из Lecture Notes in Computer Science, стр. 269-287. Springer, (1995)An Operational Model of QuickPay - Extended Abstract., , и . CARDIS, том 1820 из Lecture Notes in Computer Science, стр. 19-28. Springer, (1998)The Operational Semantics of a Java Secure Processor., , и . Formal Syntax and Semantics of Java, том 1523 из Lecture Notes in Computer Science, стр. 313-352. Springer, (1999)Rethinking Blockchain Security: Position Paper., , , , , , , и . iThings/GreenCom/CPSCom/SmartData, стр. 1273-1280. IEEE, (2018)