From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Computer-Aided Cryptographic Proofs., , , , и . ITP, том 7406 из Lecture Notes in Computer Science, стр. 11-27. Springer, (2012)An Introduction to Certificate Translation., и . FOSAD, том 5705 из Lecture Notes in Computer Science, стр. 51-95. Springer, (2008)Certificate translation for optimizing compilers., , , и . ACM Trans. Program. Lang. Syst., 31 (5): 18:1-18:45 (2009)Fully automated analysis of padding-based encryption in the computational model., , , , , , и . ACM Conference on Computer and Communications Security, стр. 1247-1260. ACM, (2013)Certified Reasoning in Memory Hierarchies., , и . APLAS, том 5356 из Lecture Notes in Computer Science, стр. 75-90. Springer, (2008)Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification., , и . LFCS, том 7734 из Lecture Notes in Computer Science, стр. 29-43. Springer, (2013)Perspectives in Certificate Translation., и . TGC, том 6084 из Lecture Notes in Computer Science, стр. 23-34. Springer, (2010)Certificate translation for specification-preserving advices., и . FOAL, стр. 9-18. ACM, (2008)An Abstract Model of Certificate Translation., и . ACM Trans. Program. Lang. Syst., 33 (4): 13:1-13:46 (2011)Program Parallelization Using Synchronized Pipelining., , и . LOPSTR, том 6037 из Lecture Notes in Computer Science, стр. 173-187. Springer, (2009)