Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Certificate translation for optimizing compilers., , , and . ACM Trans. Program. Lang. Syst., 31 (5): 18:1-18:45 (2009)An Information Flow Monitor for a Core of DOM - Introducing References and Live Primitives., , and . TGC, volume 8902 of Lecture Notes in Computer Science, page 1-16. Springer, (2014)On the Content Security Policy Violations due to the Same-Origin Policy., , and . WWW, page 877-886. ACM, (2017)Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication., and . CSF, page 157-170. IEEE Computer Society, (2012)A Taxonomy of Information Flow Monitors., and . POST, volume 9635 of Lecture Notes in Computer Science, page 46-67. Springer, (2016)Session Types for Access and Information Flow Control., , , and . CONCUR, volume 6269 of Lecture Notes in Computer Science, page 237-252. Springer, (2010)A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms., , and . ACM Conference on Computer and Communications Security, page 432-441. ACM, (2009)Binsec/Rel: Efficient Relational Symbolic Execution for Constant-Time at Binary-Level., , and . CoRR, (2019)Security types preserving compilation., , and . Computer Languages, Systems & Structures, 33 (2): 35-59 (2007)A Better Facet of Dynamic Information Flow Control., , , , , and . WWW (Companion Volume), page 731-739. ACM, (2018)