Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping between Alloy Specifications and Database Implementations., and . SEFM, page 285-294. IEEE Computer Society, (2009)A Generic Scheme and Properties of Bidirectional Transformations., , , and . CoRR, (2013)A Clear Picture of Lens Laws - Functional Pearl., , and . MPC, volume 9129 of Lecture Notes in Computer Science, page 215-223. Springer, (2015)Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks., , , , , and . CSF, page 132-146. IEEE Computer Society, (2018)BiFluX: A Bidirectional Functional Update Language for XML., , and . PPDP, page 147-158. ACM, (2014)Calculating with lenses: optimising bidirectional transformations., and . PEPM, page 91-100. ACM, (2011)A formal treatment of the role of verified compilers in secure computation., , , , , and . J. Log. Algebraic Methods Program., (2022)Coupled Schema Transformation and Data Conversion for XML and SQL., , , and . PADL, volume 4354 of Lecture Notes in Computer Science, page 290-304. Springer, (2007)Jasmin: High-Assurance and High-Speed Cryptography., , , , , , , , , and . ACM Conference on Computer and Communications Security, page 1807-1823. ACM, (2017)Composing Least-change Lenses., , , and . ECEASST, (2013)