Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formally Verifying Isolation and Availability in an Idealized Model of Virtualization., , , and . FM, volume 6664 of Lecture Notes in Computer Science, page 231-245. Springer, (2011)A Formal Executable Semantics of the JavaCard Platform., , , , and . ESOP, volume 2028 of Lecture Notes in Computer Science, page 302-319. Springer, (2001)CIC^( ): Type-Based Termination of Recursive Definitions in the Calculus of Inductive Constructions., , and . LPAR, volume 4246 of Lecture Notes in Computer Science, page 257-271. Springer, (2006)System-Level Non-interference of Constant-Time Cryptography. Part I: Model., , , and . J. Autom. Reason., 63 (1): 1-51 (2019)An Introduction to Dependent Type Theory., and . APPSEM, volume 2395 of Lecture Notes in Computer Science, page 1-41. Springer, (2000)Masking the GLP Lattice-Based Signature Scheme at Any Order., , , , , , and . J. Cryptol., 37 (1): 5 (March 2024)The Last Mile: High-Assurance and High-Speed Cryptographic Implementations., , , , , , , and . CoRR, (2019)Secure information flow for a concurrent language with scheduling., and . J. Comput. Secur., 15 (6): 647-689 (2007)Spectre Declassified: Reading from the Right Place at the Wrong Time., , , , , , , , , and . SP, page 1753-1770. IEEE, (2023)An Introduction to Certificate Translation., and . FOSAD, volume 5705 of Lecture Notes in Computer Science, page 51-95. Springer, (2008)