Author of the publication

Secure Service Orchestration.

, , , and . FOSAD, volume 4677 of Lecture Notes in Computer Science, page 24-74. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of recursive Bitcoin contracts., , , and . CoRR, (2020)Tree-based search for stochastic simulation algorithm., and . SAC, page 1415-1416. ACM, (2012)Handling exp, × (and Timestamps) in Protocol Analysis., and . FoSSaCS, volume 3921 of Lecture Notes in Computer Science, page 413-427. Springer, (2006)Fun with Bitcoin Smart Contracts., , and . ISoLA (4), volume 11247 of Lecture Notes in Computer Science, page 432-449. Springer, (2018)Honesty by Typing., , , and . FMOODS/FORTE, volume 7892 of Lecture Notes in Computer Science, page 305-320. Springer, (2013)A Formal Model of Algorand Smart Contracts., , , , and . Financial Cryptography (1), volume 12674 of Lecture Notes in Computer Science, page 93-114. Springer, (2021)Models for Cryptographic Protocol Analysis.. University of Pisa, Italy, (2006)Compliance in Behavioural Contracts: A Brief Survey., , and . Programming Languages with Applications to Biology and Security, volume 9465 of Lecture Notes in Computer Science, page 103-121. Springer, (2015)Computationally sound Bitcoin tokens., , and . CSF, page 1-15. IEEE, (2021)On the Decidability of Honesty and of Its Variants., and . WS-FM, volume 9421 of Lecture Notes in Computer Science, page 143-166. Springer, (2015)