Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Les espaces d'interaction Vers une géométrie des systèmes d'agents mobiles., , and . L'OBJET, 10 (2-3): 31-45 (2004)Formal Proof of Provable Security by Game-Playing in a Proof Assistant., , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 151-168. Springer, (2007)Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables., and . Formal to Practical Security, volume 5458 of Lecture Notes in Computer Science, page 1-20. Springer, (2009)Semantics of Probabilistic Programs using s-Finite Kernels in Coq., , and . CPP, page 3-16. ACM, (2023)Towards a Practical Library for Monadic Equational Reasoning in Coq., and . MPC, volume 13544 of Lecture Notes in Computer Science, page 151-177. Springer, (2022)Extending Equational Monadic Reasoning with Monad Transformers., and . TYPES, volume 188 of LIPIcs, page 2:1-2:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Formalization of Shannon's Theorems., , and . J. Autom. Reason., 53 (1): 63-103 (2014)An Intrinsic Encoding of a Subset of C and its Application to TLS Network Packet Processing., and . J. Formaliz. Reason., 7 (1): 63-104 (2014)Examples of Formal Proofs about Data Compression., , and . ISITA, page 633-637. IEEE, (2018)A Comprehensive Overview of the Lebesgue Differentiation Theorem in Coq., and . CoRR, (2024)