Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Case Study in Information Flow Refinement for Low Level Systems., , , , and . The Logic of Software. A Tasting Menu of Formal Methods, volume 13360 of Lecture Notes in Computer Science, page 54-79. Springer, (2022)Reasoning about Higher-Order Processes., and . TAPSOFT, volume 915 of Lecture Notes in Computer Science, page 202-216. Springer, (1995)On the Secure Implementation of Security Protocols., and . ESOP, volume 2618 of Lecture Notes in Computer Science, page 144-158. Springer, (2003)Refinement-Based Verification of Device-to-Device Information Flow., , and . FMCAD, page 123-132. IEEE, (2021)Foundations and Tools in HOL4 for Analysis of Microarchitectural Out-of-Order Execution., , , , and . FMCAD, page 129-138. IEEE, (2022)Proving Trust in Systems of 2nd-Order Processes: Preliminary Results.. HICSS (7), page 255-264. IEEE Computer Society, (1998)System Description: Verification of Distributed Erlang Programs., , , and . CADE, volume 1421 of Lecture Notes in Computer Science, page 38-41. Springer, (1998)CTL* and ECTL* as Fragments of the Modal µ-Calculus.. CAAP, volume 581 of Lecture Notes in Computer Science, page 145-164. Springer, (1992)On the Decidability of Process Equivalences for the pi-calculus.. AMAST, volume 936 of Lecture Notes in Computer Science, page 169-183. Springer, (1995)Formal Verification of Secure User Mode Device Execution with DMA., and . Haifa Verification Conference, volume 8855 of Lecture Notes in Computer Science, page 236-251. Springer, (2014)