Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Guest editors' introduction: Special issue on Formal Methods for Smart Cards., and . J. Log. Algebraic Methods Program., 58 (1-2): 1-2 (2004)Conjunctive Type Systems and Abstract Interpretation of Higher-Order Functional Programs.. J. Log. Comput., 5 (4): 397-421 (1995)Validation du contrôle d'accès dans des cartes à puce multiapplications., and . Technique et Science Informatiques, 23 (3): 323-357 (2004)Termination of Ethereum's Smart Contracts., , and . ICETE (2), page 39-51. ScitePress, (2020)Computing Stack Maps with Interfaces., , and . ECOOP, volume 5142 of Lecture Notes in Computer Science, page 642-666. Springer, (2008)Inference of Polymorphic and Conditional Strictness Properties.. POPL, page 209-221. ACM, (1998)Compiling Sandboxes: Formally Verified Software Fault Isolation., , , , and . ESOP, volume 11423 of Lecture Notes in Computer Science, page 499-524. Springer, (2019)A Backwards Analysis for Compile-time Garbage Collection., and . ESOP, volume 432 of Lecture Notes in Computer Science, page 227-239. Springer, (1990)Certified Result Checking for Polyhedral Analysis of Bytecode Programs., , , and . TGC, volume 6084 of Lecture Notes in Computer Science, page 253-267. Springer, (2010)Coarse Grained Java Security Policies., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 296. Springer, (1998)