Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verified Cryptographic Implementations for TLS, , , and . ACM Trans. Inf. Syst. Secur., 15 (1): 3:1--3:32 (March 2012)The Reflexive CHAM and the Join-Calculus., and . Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, page 372-385. Association for Computing Machinery, (1996)The Join Calculus: A Language for Distributed Mobile Programming., and . APPSEM, volume 2395 of Lecture Notes in Computer Science, page 268-332. Springer, (2000)JoCaml: A Language for Concurrent Distributed and Mobile Programming., , , and . Advanced Functional Programming, volume 2638 of Lecture Notes in Computer Science, page 129-158. Springer, (2002)A Calculus of Mobile Agents., , , , and . CONCUR, volume 1119 of Lecture Notes in Computer Science, page 406-421. Springer, (1996)A Formal Implementation of Value Commitment., , and . ESOP, volume 4960 of Lecture Notes in Computer Science, page 383-397. Springer, (2008)A Top-Down Look at a Secure Message., , and . FSTTCS, volume 1738 of Lecture Notes in Computer Science, page 122-141. Springer, (1999)Private authentication., and . Theor. Comput. Sci., 322 (3): 427-476 (2004)A semantics for web services authentication., , and . POPL, page 198-209. ACM, (2004)Modular verification of security protocol code by typing., , and . POPL, page 445-456. ACM, (2010)