From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

High Speed Encrypted Computing: Stochastic Confusion and Lies in a Secret Computer.. DSC, стр. 1-8. IEEE, (2022)Formal Methods Communities of Practice: A Survey of Personal Experience., и . SEFM Workshops, том 13230 из Lecture Notes in Computer Science, стр. 287-301. Springer, (2021)On the Security of Fully Homomorphic Encryption and Encrypted Computing: Is Division safe?, и . CoRR, (2014)Decompilation: The Enumeration of Types and Grammars., и . ACM Trans. Program. Lang. Syst., 16 (5): 1613-1647 (1994)Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name.. CoRR, (2019)Safe Compilation for Hidden Deterministic Hardware Aliasing., и . ISSRE Workshops, стр. 422-427. IEEE, (2019)Verification in the Light and Large: Large-Scale Verification for Fast-Moving Open Source C Projects., и . SEW, стр. 246-255. IEEE Computer Society, (2007)Soundness and Completeness of the NRB Verification Logic., и . SEFM Workshops, том 8368 из Lecture Notes in Computer Science, стр. 389-404. Springer, (2013)Decompilation is the Efficient Enumeration of Types., и . WSA, том 81-82 из Series Bigre, стр. 255-273. Atelier Irisa, IRISA, Campus de Beaulieu, (1992)An Analysis/Synthesis Language with Learning Strategies.. JTASPEFT/WSA, том 74 из Series Bigre, стр. 202-209. Atelier Irisa, IRISA, Campus de Beaulieu, (1991)