Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High-Assurance Cryptography Software in the Spectre Era., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)A certified lightweight non-interference Java bytecode verifier., , and . Math. Struct. Comput. Sci., 23 (5): 1032-1081 (2013)Certificate Translation for Optimizing Compilers., , , and . SAS, volume 4134 of Lecture Notes in Computer Science, page 301-317. Springer, (2006)Security types preserving compilation., , and . Comput. Lang. Syst. Struct., 33 (2): 35-59 (2007)Type Abstraction for Relaxed Noninterference., , , and . ECOOP, volume 74 of LIPIcs, page 7:1-7:27. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Comparing the Detection of XSS Vulnerabilities in Node.js and a Multi-tier JavaScript-based Language via Deep Learning., , and . ICISSP, page 189-201. SCITEPRESS, (2022)Spot the Difference: Secure Multi-execution and Multiple Facets., and . ESORICS (1), volume 9878 of Lecture Notes in Computer Science, page 501-519. Springer, (2016)High-Assurance Cryptography in the Spectre Era., , , , , , , , and . SP, page 1884-1901. IEEE, (2021)Clockwork: Tracking Remote Timing Attacks., , , and . CSF, page 350-365. IEEE, (2020)Security Types Preserving Compilation: (Extended Abstract)., , and . VMCAI, volume 2937 of Lecture Notes in Computer Science, page 2-15. Springer, (2004)