Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Honesty by Typing., , , and . FMOODS/FORTE, volume 7892 of Lecture Notes in Computer Science, page 305-320. Springer, (2013)Fun with Bitcoin Smart Contracts., , and . ISoLA (4), volume 11247 of Lecture Notes in Computer Science, page 432-449. Springer, (2018)Tree-based search for stochastic simulation algorithm., and . SAC, page 1415-1416. ACM, (2012)Handling exp, × (and Timestamps) in Protocol Analysis., and . FoSSaCS, volume 3921 of Lecture Notes in Computer Science, page 413-427. Springer, (2006)Verification of recursive Bitcoin contracts., , , and . CoRR, (2020)Models for Cryptographic Protocol Analysis.. University of Pisa, Italy, (2006)A Formal Model of Algorand Smart Contracts., , , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 93-114. Springer, (2021)Computationally sound Bitcoin tokens., , and . CSF, page 1-15. IEEE, (2021)Compliance in Behavioural Contracts: A Brief Survey., , and . Programming Languages with Applications to Biology and Security, volume 9465 of Lecture Notes in Computer Science, page 103-121. Springer, (2015)On the Decidability of Honesty and of Its Variants., and . WS-FM, volume 9421 of Lecture Notes in Computer Science, page 143-166. Springer, (2015)