From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards a Verified Model of the Algorand Consensus Protocol in Coq., , , , , , и . FM Workshops (1), том 12232 из Lecture Notes in Computer Science, стр. 362-367. Springer, (2019)Resource and timing aspects of security protocols., , , , , , и . J. Comput. Secur., 29 (3): 299-340 (2021)A Symbolic Rewriting Semantics of the COMPASS Modeling Language.. IRI, стр. 283-290. IEEE Computer Society, (2017)Executable rewriting logic semantics of Orc and formal analysis of Orc programs., и . J. Log. Algebraic Methods Program., 84 (4): 505-533 (2015)On the Security and Complexity of Periodic Systems., , , , , и . SN Comput. Sci., 3 (5): 356 (2022)Towards Formal Verification of Orchestration Computations Using the 핂 Framework., и . FM, том 9109 из Lecture Notes in Computer Science, стр. 40-56. Springer, (2015)On the Formalization and Computational Complexity of Resilience Problems for Cyber-Physical Systems., , , , , и . ICTAC, том 13572 из Lecture Notes in Computer Science, стр. 96-113. Springer, (2022)Resource-Bounded Intruders in Denial of Service Attacks., , , , , , и . CSF, стр. 382-396. IEEE, (2019)Statistical Model Checking of Distance Fraud Attacks on the Hancke-Kuhn Family of Protocols., , , , , и . CPS-SPC@CCS, стр. 60-71. ACM, (2018)Program comprehension through reverse-engineered sequence diagrams: A systematic review., , и . Journal of Software: Evolution and Process, (2018)