From post

Distributed Authorization with Distributed Grammars.

, , , , , и . Programming Languages with Applications to Biology and Security, том 9465 из Lecture Notes in Computer Science, стр. 10-26. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The Geometry of Optimal Lambda Reduction., , и . POPL, стр. 15-26. ACM Press, (1992)Explicit Substitutions., , , и . POPL, стр. 31-46. ACM Press, (1990)A Logical View of Composition and Refinement., и . POPL, стр. 323-332. ACM Press, (1991)Adversarial Patch, , , , и . (2017)cite arxiv:1712.09665.On Subtyping and Matching., и . ECOOP, том 952 из Lecture Notes in Computer Science, стр. 145-167. Springer, (1995)Secrecy Types for Asymmetric Communication., и . FoSSaCS, том 2030 из Lecture Notes in Computer Science, стр. 25-41. Springer, (2001)Types for Safe Locking., и . ESOP, том 1576 из Lecture Notes in Computer Science, стр. 91-108. Springer, (1999)Certified email with a light on-line trusted third party: design and implementation., и . WWW, стр. 387-395. ACM, (2002)Deciding Knowledge in Security Protocols Under Equational Theories., и . ICALP, том 3142 из Lecture Notes in Computer Science, стр. 46-58. Springer, (2004)A Logic of Object-Oriented Programs., и . TAPSOFT, том 1214 из Lecture Notes in Computer Science, стр. 682-696. Springer, (1997)