Author of the publication

A core calculus for secure hardware: its formal semantics and proof system.

, , , and . MEMOCODE, page 122-131. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Heterogeneous Reasoning with Euler/Venn Diagrams Containing Named Constants and FOL., and . Euler, volume 134 of Electronic Notes in Theoretical Computer Science, page 153-187. Elsevier, (2004)A programming model for reconfigurable computing based in functional concurrency., , , , and . ReCoSoC, page 1-8. IEEE, (2016)Kripke Models for Linear Logic., and . J. Symb. Log., 58 (2): 514-545 (1993)A Principled Approach to Secure Multi-core Processor Design with ReWire., , , , and . ACM Trans. Embed. Comput. Syst., 16 (2): 33:1-33:25 (2017)A core calculus for secure hardware: its formal semantics and proof system., , , and . MEMOCODE, page 122-131. ACM, (2017)Hardware Synthesis from Functional Embedded Domain-Specific Languages: A Case Study in Regular Expression Compilation., , , , and . ARC, volume 9040 of Lecture Notes in Computer Science, page 41-52. Springer, (2015)Using DAG Transformations to Verify Euler/Venn Homogeneous and Euler/Venn FOL Heterogeneous Rules of Inference., and . GT-VMT@ICGT, volume 72 of Electronic Notes in Theoretical Computer Science, page 78-92. Elsevier, (2002)Verifiable Security Templates for Hardware., and . DATE, page 658-661. IEEE, (2020)The AAAI Fall Symposia., , , , , , , , , and . AI Magazine, 20 (3): 87-89 (1999)The Confinement Problem in the Presence of Faults., , and . ICFEM, volume 7635 of Lecture Notes in Computer Science, page 182-197. Springer, (2012)