Author of the publication

Factorization of Behavioral Integrity.

, , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 500-519. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic Image Segmentation and Grading Diagnosis of Sacroiliitis Associated with AS Using a Deep Convolutional Neural Network on CT Images., , , , , , , , , and 3 other author(s). J. Imaging Inform. Medicine, 36 (5): 2025-2034 (2023)Optimization on multi-object tracking and segmentation in pigs' weight measurement., , , , and . Comput. Electron. Agric., (2021)Towards Verifying Ethereum Smart Contracts at Intermediate Language Level., , , , , and . ICFEM, volume 11852 of Lecture Notes in Computer Science, page 121-137. Springer, (2019)Attention-based Efficient Classification for 3D MRI Image of Alzheimer's Disease., , , and . SSIP, page 34-39. ACM, (2023)Formalizing the Transaction Flow Process of Hyperledger Fabric., , , , and . ICFEM, volume 12531 of Lecture Notes in Computer Science, page 233-250. Springer, (2020)Research on E-government Initiatives and Enabling IT.. SNPD, page 59-62. IEEE Computer Society, (2009)Reasoning About Iteration and Recursion Uniformly Based on Big-Step Semantics., , , , and . SETTA, volume 13071 of Lecture Notes in Computer Science, page 61-80. Springer, (2021)Formal Verification of Interrupt Isolation for the TrustZone-based TEE., , , , , , and . APSEC, page 309-318. IEEE, (2023)Formal Verification of Memory Isolation for the TrustZone-based TEE., , , , , and . APSEC, page 149-158. IEEE, (2020)A HOL Theory of the Differential for Matrix Functions., , , , , and . TASE, page 121-127. IEEE, (2019)