From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Principles for Entity Authentication., , и . Ershov Memorial Conference, том 2890 из Lecture Notes in Computer Science, стр. 294-306. Springer, (2003)The Good, The Bad and The Ugly: Pitfalls and Best Practices in Automated Sound Static Analysis of Ethereum Smart Contracts., , и . ISoLA (3), том 12478 из Lecture Notes in Computer Science, стр. 212-231. Springer, (2020)Security & privacy column.. ACM SIGLOG News, 3 (1): 33 (2016)CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model., , , и . CoRR, (2023)Sleepy Channels: Bi-directional Payment Channels without Watchtowers., , , , и . CCS, стр. 179-192. ACM, (2022)Glimpse: On-Demand, Cross-Chain Communication for Efficient DeFi Applications on Bitcoin-based Blockchains., , , и . IACR Cryptol. ePrint Arch., (2022)Formal Methods for the Security Analysis of Smart Contracts.. FMCAD, стр. 1-2. IEEE, (2021)Analysis of Typed Analyses of Authentication Protocols., , и . CSFW, стр. 112-125. IEEE Computer Society, (2005)CryptoVampire: Automated Reasoning for the Complete Symbolic Attacker Cryptographic Model., , , и . IACR Cryptol. ePrint Arch., (2024)A Sound Flow-Sensitive Heap Abstraction for the Static Analysis of Android Applications., , , и . CSF, стр. 22-36. IEEE Computer Society, (2017)