Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The VLISP Verified PreScheme Compiler., , and . LISP Symb. Comput., 8 (1-2): 111-182 (1995)The Alonzo functional programming language.. ACM SIGPLAN Notices, 24 (9): 152-157 (1989)The VLISP Verified Scheme System., , and . LISP Symb. Comput., 8 (1-2): 33-110 (1995)Prettyprinting structured programs with connector lines.. ACM SIGPLAN Notices, 14 (9): 74-75 (1979)Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA., , and . IFM, volume 11023 of Lecture Notes in Computer Science, page 130-150. Springer, (2018)A Hybrid Analysis for Security Protocols with State., , , and . IFM, volume 8739 of Lecture Notes in Computer Science, page 272-287. Springer, (2014)CST: C State Transformers.. ACM SIGPLAN Notices, 30 (12): 32-36 (1995)Homomorphisms and Minimality for Enrich-by-Need Security Analysis., , and . CoRR, (2018)An Analysis of the CAVES Attestation Protocol using CPSA, , , and . CoRR, (2012)Understanding Attestation: Analyzing Protocols that Use Quotes., and . STM, volume 11738 of Lecture Notes in Computer Science, page 89-106. Springer, (2019)