Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Assurance Cryptography Software in the Spectre Era., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)Certificate Translation for Optimizing Compilers., , , and . SAS, volume 4134 of Lecture Notes in Computer Science, page 301-317. Springer, (2006)Security types preserving compilation., , and . Comput. Lang. Syst. Struct., 33 (2): 35-59 (2007)A certified lightweight non-interference Java bytecode verifier., , and . Math. Struct. Comput. Sci., 23 (5): 1032-1081 (2013)Type Abstraction for Relaxed Noninterference., , , and . ECOOP, volume 74 of LIPIcs, page 7:1-7:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning., , and . ICISSP, page 189-201. SCITEPRESS, (2022)High-Assurance Cryptography in the Spectre Era., , , , , , , , and . SP, page 1884-1901. IEEE, (2021)Spot the Difference: Secure Multi-execution and Multiple Facets., and . ESORICS (1), volume 9878 of Lecture Notes in Computer Science, page 501-519. Springer, (2016)Security Types Preserving Compilation: (Extended Abstract)., , and . VMCAI, volume 2937 of Lecture Notes in Computer Science, page 2-15. Springer, (2004)Clockwork: Tracking Remote Timing Attacks., , , and . CSF, page 350-365. IEEE, (2020)