Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable Security Templates for Hardware., and . DATE, page 658-661. IEEE, (2020)The Confinement Problem in the Presence of Faults., , and . ICFEM, volume 7635 of Lecture Notes in Computer Science, page 182-197. Springer, (2012)Proof Abstraction for Imperative Languages.. APLAS, volume 4279 of Lecture Notes in Computer Science, page 97-113. Springer, (2006)Achieving information flow security through monadic control of effects., and . Journal of Computer Security, 17 (5): 599-653 (2009)Language Abstractions for Hardware-based Control-Flow Integrity Monitoring., and . ReConFig, page 1-6. IEEE, (2018)Semantics-directed machine architecture in ReWire., , , , and . FPT, page 446-449. IEEE, (2013)Formalized High Level Synthesis with Applications to Cryptographic Hardware., , , , , , and . NFM, volume 13903 of Lecture Notes in Computer Science, page 332-352. Springer, (2023)The logic of demand in Haskell., and . J. Funct. Program., 15 (5): 837-891 (2005)An investigation of microcomputer policies in large organizations., and . Inf. Manag., 12 (5): 223-233 (1987)A Principled Approach to Secure Multi-core Processor Design with ReWire., , , , and . ACM Trans. Embed. Comput. Syst., 16 (2): 33:1-33:25 (2017)