Author of the publication

Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications.

, , , and . CSF, page 203-216. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Supporting Cloud Computing: ConfiChair, a Case Study., , and . POST, volume 7215 of Lecture Notes in Computer Science, page 89-108. Springer, (2012)A Trusted Infrastructure for P2P-based Marketplaces., , and . Peer-to-Peer Computing, page 151-154. IEEE, (2009)Untraceability in the applied pi-calculus., , , and . ICITST, page 1-6. IEEE, (2009)Towards a Verified Reference Implementation of a Trusted Platform Module., , and . Security Protocols Workshop, volume 7028 of Lecture Notes in Computer Science, page 69-81. Springer, (2009)Approximating ATL* in ATL., , and . VMCAI, volume 2294 of Lecture Notes in Computer Science, page 289-301. Springer, (2002)Belief Revision and Verisimilitude., and . Notre Dame J. Formal Log., 36 (1): 15-29 (1995)The Future of Transportation: Ethical, Legal, Social and Economic Impacts of Self-driving Vehicles in the Year 2025.. Sci. Eng. Ethics, 26 (3): 1185-1208 (2020)In AI We Trust: Ethics, Artificial Intelligence, and Reliability.. Sci. Eng. Ethics, 26 (5): 2749-2767 (2020)Intertranslating Counterfactuals and Updates., and . ECAI, page 100-104. John Wiley and Sons, Chichester, (1996)Towards Symbolic Strategy Synthesis for łeftłeftA \right \right\rangle-LTL., , and . TIME, page 137-146. IEEE Computer Society, (2003)