From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Parametricity and Variants of Girard's J Operator., и . Inf. Process. Lett., 70 (1): 1-5 (1999)Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs., , и . ESORICS, том 6879 из Lecture Notes in Computer Science, стр. 133-149. Springer, (2011)Inductive Proofs of Computational Secrecy., , , и . ESORICS, том 4734 из Lecture Notes in Computer Science, стр. 219-234. Springer, (2007)A Layered Architecture for Detecting Malicious Behaviors., , , , и . RAID, том 5230 из Lecture Notes in Computer Science, стр. 78-97. Springer, (2008)Evaluating the privacy properties of telephone metadata., , и . Proc. Natl. Acad. Sci. USA, 113 (20): 5536-5541 (2016)A Compositional Logic for Proving Security Properties of Protocols., , и . J. Comput. Secur., 11 (4): 677-722 (2003)On Abstraction and the Expressive Power of Programming Languages.. Sci. Comput. Program., 21 (2): 141-163 (1993)A modular correctness proof of IEEE 802.11i and TLS., , , , и . CCS, стр. 2-15. ACM, (2005)A Type System for Object Initialization in the Java Bytecode Language., и . OOPSLA, стр. 310-327. ACM, (1998)SIGPLAN Notices 33(10).Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods., и . WOOT, USENIX Association, (2008)