Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software verification with VeriFast: Industrial case studies., , , , , and . Sci. Comput. Program., (2014)Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature., , , and . Journal of Object Technology, 3 (2): 27-35 (2004)Interconnecting domains with heterogeneous key distribution and authentication protocols., , and . IEEE Symposium on Security and Privacy, page 66-79. IEEE Computer Society, (1993)Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting., , , , , and . IEEE Symposium on Security and Privacy, page 541-555. IEEE Computer Society, (2013)Efficient Isolation of Trusted Subsystems in Embedded Systems., , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 344-361. Springer, (2010)On the effectiveness of virtualization-based security., , , , and . CoRR, (2014)Preface., , and . Sci. Comput. Program., 74 (1-2): 1 (2008)Secure Compilation to Protected Module Architectures., , , , , and . ACM Trans. Program. Lang. Syst., 37 (2): 6:1-6:50 (2015)VeriFast for Java: A Tutorial., , and . Aliasing in Object-Oriented Programming, volume 7850 of Lecture Notes in Computer Science, Springer, (2013)Partial Type Signatures for Haskell., , , and . PADL, volume 8324 of Lecture Notes in Computer Science, page 17-32. Springer, (2014)