Author of the publication

Secrecy Types for Asymmetric Communication.

, and . FoSSaCS, volume 2030 of Lecture Notes in Computer Science, page 25-41. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Implementation of Channel Abstractions., , and . LICS, page 105-116. IEEE Computer Society, (1998)The Existence of Refinement Mappings, and . LICS, page 165-175. IEEE Computer Society, (1988)Reasoning about Cryptographic Protocols in the Spi Calculus., and . CONCUR, volume 1243 of Lecture Notes in Computer Science, page 59-73. Springer, (1997)Deciding Knowledge in Security Protocols under (Many More) Equational Theories., and . CSFW, page 62-76. IEEE Computer Society, (2005)On the Protection of Private Information in Machine Learning Systems: Two Recent Approches., , , , , , , and . CSF, page 1-6. IEEE Computer Society, (2017)XFI: Software Guards for System Address Spaces., , , , and . OSDI, page 75-88. USENIX Association, (2006)Automatic Mutual Exclusion and Atomicity Checks.. Concurrency, Graphs and Models, volume 5065 of Lecture Notes in Computer Science, page 510-526. Springer, (2008)Distributed Authorization with Distributed Grammars., , , , , and . Programming Languages with Applications to Biology and Security, volume 9465 of Lecture Notes in Computer Science, page 10-26. Springer, (2015)Mobile values, new names, and secure communication., and . POPL, page 104-115. ACM, (2001)ACM SIGPLAN Notices 36(3), March 2001.Host Fingerprinting and Tracking on the Web: Privacy and Security Implications., , , , and . NDSS, The Internet Society, (2012)