From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Inductive Trace Properties for Computational Security., , , и . IACR Cryptology ePrint Archive, (2006)A Learning-Based Approach to Reactive Security, , , , , и . CoRR, (2009)On the Type Structure of Standard ML., и . ACM Trans. Program. Lang. Syst., 15 (2): 211-252 (1993)preliminary version: POPL 1988: 28-46.Security analysis of network protocols: logical and computational methods.. PPDP, стр. 151-152. ACM, (2005)The analysis of programming structure., и . SIGACT News, 28 (2): 24-31 (1997)Notes on Typed Object-Oriented Programming., и . TACS, том 789 из Lecture Notes in Computer Science, стр. 844-885. Springer, (1994)Contract Signing, Optimism, and Advantage., , , и . CONCUR, том 2761 из Lecture Notes in Computer Science, стр. 361-377. Springer, (2003)Representation Independence and Data Abstraction.. POPL, стр. 263-276. ACM Press, (1986)Toward a Typed Foundation for Method Specialization and Inheritance.. POPL, стр. 109-124. ACM Press, (1990)Connecting Formal Semantics to Constructive Intuitions., , и . Constructivity in Computer Science, том 613 из Lecture Notes in Computer Science, стр. 1-21. Springer, (1991)