Author of the publication

Secure Embedded Platform with Advanced Process Isolation and Anonymity Capabilities.

, , , , , , , , , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 238-239. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Bloem, Roderick
add a person with the name Bloem, Roderick
 

Other publications of authors with the same name

Synthesis of Reactive(1) designs., , , , and . J. Comput. Syst. Sci., 78 (3): 911-938 (2012)Safe Reinforcement Learning via Shielding., , , , , and . CoRR, (2017)OpenSEA: Semi-Formal Methods for Soft Error Analysis., , , , , and . CoRR, (2017)Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking., , , , and . IACR Cryptology ePrint Archive, (2018)Controller synthesis for pipelined circuits using uninterpreted functions., and . MEMOCODE, page 31-42. IEEE, (2011)RAT: A Tool for the Formal Analysis of Requirements., , , , and . CAV, volume 4590 of Lecture Notes in Computer Science, page 263-267. Springer, (2007)Better Quality in Synthesis through Quantitative Objectives., , , and . CAV, volume 5643 of Lecture Notes in Computer Science, page 140-156. Springer, (2009)Repair of Boolean Programs with an Application to C., , and . CAV, volume 4144 of Lecture Notes in Computer Science, page 358-371. Springer, (2006)Efficient Decision Procedures for Model Checking of Linear Time Logic Properties., , and . CAV, volume 1633 of Lecture Notes in Computer Science, page 222-235. Springer, (1999)SAT-based methods for circuit synthesis., , , , and . FMCAD, page 31-34. IEEE, (2014)