Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Correctness Proofs for Distributed Algorithms., and . PODC, page 137-151. ACM, (1987)Knowledge, Probability, and Adversaries., and . PODC, page 103-118. ACM, (1989)A Semantics for a Logic of Authentication (Extended Abstract)., and . PODC, page 201-216. ACM, (1991)Timing Games and Shared Memory., , and . DISC, volume 3724 of Lecture Notes in Computer Science, page 507-508. Springer, (2005)Collaboration of untrusting peers with changing interests., , , and . EC, page 112-119. ACM, (2004)Model checking boot code from AWS data centers., , , , , and . Formal Methods Syst. Des., 57 (1): 34-52 (2021)A Theory of Redo Recovery., and . SIGMOD Conference, page 397-406. ACM, (2003)SMT-Based System Verification with DVF., , , and . SMT@IJCAR, volume 20 of EPiC Series in Computing, page 32-43. EasyChair, (2012)Protocol Proof Checking Simplified with SMT., and . NCA, page 195-202. IEEE Computer Society, (2012)Going with the Flow: Parameterized Verification Using Message Flows., and . FMCAD, page 1-8. IEEE, (2008)