Author of the publication

Compositional Verification of Security Properties for Embedded Execution Platforms.

, , and . PROOFS, volume 49 of EPiC Series in Computing, page 1-16. EasyChair, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CTL* and ECTL* as Fragments of the Modal µ-Calculus.. CAAP, volume 581 of Lecture Notes in Computer Science, page 145-164. Springer, (1992)On the Decidability of Process Equivalences for the pi-calculus.. AMAST, volume 936 of Lecture Notes in Computer Science, page 169-183. Springer, (1995)Hoare-Style Logic for Unstructured Programs., , , and . SEFM, volume 12310 of Lecture Notes in Computer Science, page 193-213. Springer, (2020)Gossiping for threshold detection., , and . Integrated Network Management, page 259-266. IEEE, (2009)Formal Verification of Secure User Mode Device Execution with DMA., and . Haifa Verification Conference, volume 8855 of Lecture Notes in Computer Science, page 236-251. Springer, (2014)Efficient and fully abstract routing of futures in object network overlays., and . AGERE!@SPLASH, page 49-60. ACM, (2013)Decentralized real-time monitoring of network-wide aggregates., , , and . LADIS, page 7:1-7:6. ACM, (2008)On the secure implementation of security protocols., and . Sci. Comput. Program., 50 (1-3): 73-99 (2004)On Compositional Information Flow Aware Refinement., , , and . CSF, page 1-16. IEEE, (2021)Decidability and proof systems for language-based noninterference relations.. POPL, page 67-78. ACM, (2006)