Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Process Algebraic Description of a Temporal Wireless Network Protocol., , and . ECEASST, (2011)Formal polytypic programs and proofs., , and . J. Funct. Program., 20 (3-4): 213-269 (2010)A Lattice-Theoretic Model for an Algebra of Communicating Sequential Processes., , , and . ICTAC, volume 4281 of Lecture Notes in Computer Science, page 123-137. Springer, (2006)An Abstract Model of a Coordination Protocol Using the UPPAAL Model Checker., , and . EUC, page 306-311. IEEE Computer Society, (2011)Spectral Convolution Networks., , and . CoRR, (2016)Polytypic programming in COQ., , and . ICFP-WGP, page 49-60. ACM, (2008)X509Cloud - Framework for a ubiquitous PKI., , , and . MILCOM, page 225-230. IEEE, (2017)Homomorphic Encryption with Access Policies: Characterization and New Constructions., , and . AFRICACRYPT, volume 7918 of Lecture Notes in Computer Science, page 61-87. Springer, (2013)Statistics in language studies, , and . Cambridge textbooks in linguistics Cambridge university press, Cambridge, (1986)Fully Anonymous Transferable Ecash., and . IACR Cryptology ePrint Archive, (2016)