From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Typing Context-Dependent Behavioural Variation, , , и . PLACES, том 109 из EPTCS, стр. 28-33. (2012)A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols., , , и . ASIAN, том 4846 из Lecture Notes in Computer Science, стр. 150-165. Springer, (2007)Where Do Your IoT Ingredients Come From?, , , и . COORDINATION, том 9686 из Lecture Notes in Computer Science, стр. 35-50. Springer, (2016)Experimenting with a Context-Aware Language., , , и . PaCT, том 10421 из Lecture Notes in Computer Science, стр. 3-17. Springer, (2017)On Quantitative Security Policies., , и . PaCT, том 6873 из Lecture Notes in Computer Science, стр. 23-39. Springer, (2011)Transcompiling Firewalls., , , , и . POST, том 10804 из Lecture Notes in Computer Science, стр. 303-324. Springer, (2018)Fairness and Priority., и . Fundam. Informaticae, 22 (3): 299-306 (1995)Control-flow Flattening Preserves the Constant-Time Policy (Extended Version)., , и . CoRR, (2020)A Formal Analysis of Complex Type Flaw Attacks on Security Protocols., , и . AMAST, том 5140 из Lecture Notes in Computer Science, стр. 167-183. Springer, (2008)Verifying a Blockchain-Based Remote Debugging Protocol for Bug Bounty., , и . Protocols, Strands, and Logic, том 13066 из Lecture Notes in Computer Science, стр. 124-138. Springer, (2021)