Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Trust in internet election observing the Norwegian decryption and counting ceremony., , and . EVOTE, page 1-8. IEEE, (2014)Linear Logical Voting Protocols., and . VoteID, volume 7187 of Lecture Notes in Computer Science, page 53-70. Springer, (2011)Twelf and Delphin: Logic and Functional Programming in a Meta-logical Framework.. FLOPS, volume 2998 of Lecture Notes in Computer Science, page 22-23. Springer, (2004)Primitive Recursion for Higher-Order Abstract Syntax., , and . TLCA, volume 1210 of Lecture Notes in Computer Science, page 147-163. Springer, (1997)A Coverage Checking Algorithm for LF., and . TPHOLs, volume 2758 of Lecture Notes in Computer Science, page 120-135. Springer, (2003)Choreographies, logically., , and . Distributed Comput., 31 (1): 51-67 (2018)A Declaration of Software Independence., , , , and . Protocols, Strands, and Logic, volume 13066 of Lecture Notes in Computer Science, page 198-217. Springer, (2021)Rounding Considered Harmful.. E-Vote-ID, volume 11143 of Lecture Notes in Computer Science, page 189-202. Springer, (2018)A Bigraph Relational Model, and . LFMTP, volume 71 of EPTCS, page 14-28. (2011)Automated Theorem Proving in a Simple Meta-Logic for LF., and . CADE, volume 1421 of Lecture Notes in Computer Science, page 286-300. Springer, (1998)