Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Standard ML of New Jersey., and . PLILP, volume 528 of Lecture Notes in Computer Science, page 1-13. Springer, (1991)Compiling with Continuations. Cambridge University Press, (1992)Program Logics - for Certified Compilers.. Cambridge University Press, (2014)MulVAL: A Logic-based Network Security Analyzer., , and . USENIX Security Symposium, USENIX Association, (2005)Separate Compilation for Standard ML., and . PLDI, page 13-23. ACM, (1994)Modular Verification for Computer Security.. CSF, page 1-8. IEEE Computer Society, (2016)Type-preserving garbage collectors., and . POPL, page 166-178. ACM, (2001)ACM SIGPLAN Notices 36(3), March 2001.Proof-Carrying Authentication., and . ACM Conference on Computer and Communications Security, page 52-62. ACM, (1999)Runtime Tags Aren't Necessary.. LISP Symb. Comput., 2 (2): 153-162 (1989)Shrink fast correctly!, and . PPDP, page 49-60. ACM, (2017)