Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Machine Instruction Syntax and Semantics in Higher Order Logic., and . CADE, volume 1831 of Lecture Notes in Computer Science, page 7-24. Springer, (2000)Runtime Tags Aren't Necessary.. LISP Symb. Comput., 2 (2): 153-162 (1989)Compiling with Continuations. Cambridge University Press, (1992)How to defeat Rivest's ThreeBallot Voting System. (2007)Unpublished.Program Logics - for Certified Compilers.. Cambridge University Press, (2014)MulVAL: A Logic-based Network Security Analyzer., , and . USENIX Security Symposium, USENIX Association, (2005)Proof-Carrying Authentication., and . ACM Conference on Computer and Communications Security, page 52-62. ACM, (1999)Verified Software Toolchain.. NASA Formal Methods, volume 7226 of Lecture Notes in Computer Science, page 2. Springer, (2012)A Compositional Logic for Control Flow., and . VMCAI, volume 3855 of Lecture Notes in Computer Science, page 80-94. Springer, (2006)Mostly Sound Type System Improves a Foundational Program Verifier., and . CPP, volume 8307 of Lecture Notes in Computer Science, page 17-32. Springer, (2013)