Author of the publication

A Logic of Programs with Interface-Confined Code.

, , , and . CSF, page 512-525. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Detecting suspicious package updates., , , , and . ICSE (NIER), page 13-16. IEEE / ACM, (2019)Containing Malicious Package Updates in npm with a Lightweight Permission System., , , and . ICSE, page 1334-1346. IEEE, (2021)An I/O Separation Model for Formal Verification of Kernel Implementations., , and . SP, page 572-589. IEEE, (2021)A Program Logic for Verifying Secure Routing Protocols., , , , , and . FORTE, volume 8461 of Lecture Notes in Computer Science, page 117-132. Springer, (2014)FlowNotation: An Annotation System for Statically Enforcing Information Flow Policies in C., , and . CCS, page 2207-2209. ACM, (2018)Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits., , , and . CCS, page 1130-1143. ACM, (2015)Integrating GIS with Cellular Automaton Model for Railway Transportation Safety System., , and . CSIE (5), page 503-507. IEEE Computer Society, (2009)Building an inverse model of MR damper based on Dahl model., , and . ITSC, page 1148-1153. IEEE, (2014)An Optimal Communications Protocol for Maximizing Lifetime of Railway Infrastructure Wireless Monitoring Network., , , , , and . IEEE Trans. Ind. Informatics, 14 (8): 3347-3357 (2018)Quantitatively analysis of train communication network based on multi-attribute utility function., , , , , , and . ITSC, page 2330-2335. IEEE, (2014)