Author of the publication

A Linear Logic of Authorization and Knowledge.

, , , , and . ESORICS, volume 4189 of Lecture Notes in Computer Science, page 297-312. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System M: A Program Logic for Code Sandboxing and Identification., , , and . CoRR, (2015)Formal verification of higher-order probabilistic programs: reasoning about approximation, convergence, Bayesian inference, and optimization., , , , , and . Proc. ACM Program. Lang., 3 (POPL): 38:1-38:30 (2019)Higher-order probabilistic adversarial computations: categorical semantics and program logics., , , , , and . Proc. ACM Program. Lang., 5 (ICFP): 1-30 (2021)RSAC: A Robust Deep Reinforcement Learning Strategy for Dimensionality Perturbation., , , and . IEEE Trans. Emerg. Top. Comput. Intell., 6 (5): 1157-1166 (2022)Comparison of Advance Tree Data Structures, and . CoRR, (2012)Publish/subscribe based information dissemination over VANET utilizing DHT., , and . Frontiers Comput. Sci., 6 (6): 713-724 (2012)Approximation Algorithm for Resource Allocation Problems with Time Dependent Penalties., and . Int. J. Found. Comput. Sci., 28 (7): 931-944 (2017)From Fine- to Coarse-Grained Dynamic Information Flow Control and Back, a Tutorial on Dynamic Information Flow., , , , and . CoRR, (2022)Low Power Multiplier using Dynamic Voltage and Frequency Scaling (DVFS)., and . ICACCI, page 560-564. IEEE, (2014)Moldable load scheduling using demand adjustable policies., , and . ICACCI, page 143-150. IEEE, (2014)