From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Inheritance in the join calculus., , , и . J. Log. Algebraic Methods Program., 57 (1-2): 23-69 (2003)Automated verification of selected equivalences for security protocols., , и . J. Log. Algebraic Methods Program., 75 (1): 3-51 (2008)A hierarchy of equivalences for asynchronous calculi., и . J. Log. Algebraic Methods Program., 63 (1): 131-173 (2005)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , и 5 other автор(ы). IACR Cryptol. ePrint Arch., (2019)Cryptographically Sound Implementations for Communicating Processes., и . ICALP (2), том 4052 из Lecture Notes in Computer Science, стр. 83-94. Springer, (2006)An Asynchronous, Distributed Implementation of Mobile Ambients., , и . IFIP TCS, том 1872 из Lecture Notes in Computer Science, стр. 348-364. Springer, (2000)Secure sessions for Web services., , , и . ACM Trans. Inf. Syst. Secur., 10 (2): 8 (2007)Bisimulations in the join-calculus., и . Theor. Comput. Sci., 266 (1-2): 569-603 (2001)SecPAL: Design and semantics of a decentralized authorization language., , и . J. Comput. Secur., 18 (4): 619-665 (2010)Mobile values, new names, and secure communication., и . POPL, стр. 104-115. ACM, (2001)ACM SIGPLAN Notices 36(3), March 2001.