Author of the publication

Deciding knowledge in security protocols under equational theories.

, and . Theor. Comput. Sci., 367 (1-2): 2-32 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Foundations of Differential Dataflow., , and . FoSSaCS, volume 9034 of Lecture Notes in Computer Science, page 71-83. Springer, (2015)The Prophecy of Undo.. FASE, volume 9033 of Lecture Notes in Computer Science, page 347-361. Springer, (2015)Modal Theorem Proving., and . CADE, volume 230 of Lecture Notes in Computer Science, page 172-189. Springer, (1986)Learning a Natural Language Interface with Neural Programmer., , , , and . ICLR (Poster), OpenReview.net, (2017)TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems, , , , , , , , , and 30 other author(s). (2015)Software available from tensorflow.org.Just Fast Keying in the Pi Calculus., , and . ESOP, volume 2986 of Lecture Notes in Computer Science, page 340-354. Springer, (2004)Baby Modula-3 and a Theory of Objects.. J. Funct. Program., 4 (2): 249-283 (1994)Extensible Grammars for Language Specialization., , and . DBPL, page 11-31. Springer, (1993)Authentication Primitives and Their Compilation., , and . POPL, page 302-315. ACM, (2000)Control-flow integrity principles, implementations, and applications., , , and . ACM Trans. Inf. Syst. Secur., 13 (1): 4:1-4:40 (2009)