Author of the publication

Complete Lax Logical Relations for Cryptographic Lambda-Calculi.

, , , and . CSL, volume 3210 of Lecture Notes in Computer Science, page 400-414. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Ideal Approach to Computing Closed Subsets in Well-Quasi-Ordering., , , , and . CoRR, (2019)The Orchids Intrusion Detection Tool., and . CAV, volume 3576 of Lecture Notes in Computer Science, page 286-290. Springer, (2005)Continuous Previsions.. CSL, volume 4646 of Lecture Notes in Computer Science, page 542-557. Springer, (2007)Continuous R-valuations., and . ISDT, volume 2 of Electronic Notes in Theoretical Informatics and Computer Science, EpiSciences, (2022)Well Quasi-Orders in Computer Science (Dagstuhl Seminar 16031)., , , and . Dagstuhl Reports, 6 (1): 69-98 (2016)A Smell of Orchids., and . RV, volume 5289 of Lecture Notes in Computer Science, page 1-20. Springer, (2008)A Probabilistic and Non-Deterministic Call-by-Push-Value Language.. LICS, page 1-13. IEEE, (2019)Separating minimal valuations, point-continuous valuations and continuous valuations., and . CoRR, (2021)Towards Producing Formally Checkable Security Proofs, Automatically.. CSF, page 224-238. IEEE Computer Society, (2008)Reflecting BDDs in Coq., , , and . ASIAN, volume 1961 of Lecture Notes in Computer Science, page 162-181. Springer, (2000)