Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Termination of Ethereum's Smart Contracts., , and . ICETE (2), page 39-51. ScitePress, (2020)Guest editors' introduction: Special issue on Formal Methods for Smart Cards., and . J. Log. Algebraic Methods Program., 58 (1-2): 1-2 (2004)Validation du contrôle d'accès dans des cartes à puce multiapplications., and . Technique et Science Informatiques, 23 (3): 323-357 (2004)Verifying resource access control on mobile interactive devices., , , and . Journal of Computer Security, 18 (6): 971-998 (2010)Conjunctive Type Systems and Abstract Interpretation of Higher-Order Functional Programs.. J. Log. Comput., 5 (4): 397-421 (1995)Semantic Foundations and Inference of Non-null Annotations., , and . FMOODS, volume 5051 of Lecture Notes in Computer Science, page 132-149. Springer, (2008)Coarse Grained Java Security Policies., , and . ECOOP Workshops, volume 1543 of Lecture Notes in Computer Science, page 296. Springer, (1998)A Backwards Analysis for Compile-time Garbage Collection., and . ESOP, volume 432 of Lecture Notes in Computer Science, page 227-239. Springer, (1990)Polyhedral Analysis for Synchronous Languages., , and . SAS, volume 1694 of Lecture Notes in Computer Science, page 51-68. Springer, (1999)SawjaCard: A Static Analysis Tool for Certifying Java Card Applications., , and . SAS, volume 8723 of Lecture Notes in Computer Science, page 51-67. Springer, (2014)