Author of the publication

Verifiable Security of Boneh-Franklin Identity-Based Encryption.

, , and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 68-83. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximate Relational Reasoning for Probabilistic Programs.. Technical University of Madrid, Spain, (2014)Slicing of probabilistic programs based on specifications., and . Sci. Comput. Program., (2022)Reasoning about Recursive Probabilistic Programs., , , and . LICS, page 672-681. ACM, (2016)Slicing of Probabilistic Programs Based on Specifications (Extended Abstract)., and . ECOOP, volume 222 of LIPIcs, page 34:1-34:2. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Differential privacy and SPARQL., , and . Semantic Web, 15 (3): 745-773 (2024)Beyond Differential Privacy: Composition Theorems and Relational Logic for f-divergences between Probabilistic Programs., and . ICALP (2), volume 7966 of Lecture Notes in Computer Science, page 49-60. Springer, (2013)Weakest Precondition Reasoning for Expected Runtimes of Randomized Algorithms., , , and . J. ACM, 65 (5): 30:1-30:68 (2018)Verifiable Security of Boneh-Franklin Identity-Based Encryption., , and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 68-83. Springer, (2011)Contextual Linear Types for Differential Privacy., , , , , , and . ACM Trans. Program. Lang. Syst., 45 (2): 8:1-8:69 (June 2023)Probabilistic relational reasoning for differential privacy., , , and . POPL, page 97-110. ACM, (2012)