Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open bisimulation, revisited., and . Theor. Comput. Sci., 386 (3): 236-271 (2007)A formal study of two physical countermeasures against side channel attacks., , and . J. Cryptographic Engineering, 3 (3): 169-180 (2013)A formal study of two physical countermeasures against side channel attacks., , and . IACR Cryptology ePrint Archive, (2012)How to eliminate non-positive circuits in periodic scheduling: a proactive strategy based on shortest path equations., , and . RAIRO Oper. Res., 47 (3): 223-249 (2013)A formal semantics for protocol narrations., and . Theor. Comput. Sci., 389 (3): 484-511 (2007)Mobile Objects "Must" Move Safely., and . FMOODS, volume 209 of IFIP Conference Proceedings, page 129-146. Kluwer, (2002)Symbolic Bisimulation in the Spi Calculus., , and . CONCUR, volume 3170 of Lecture Notes in Computer Science, page 161-176. Springer, (2004)Random Active Shield., , , , , and . FDTC, page 103-113. IEEE Computer Society, (2012)A Formal Semantics for Protocol Narrations., and . TGC, volume 3705 of Lecture Notes in Computer Science, page 163-181. Springer, (2005)The Speedup-Test: a statistical methodology for programme speedup analysis and computation., , and . Concurr. Comput. Pract. Exp., 25 (10): 1410-1426 (2013)