Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bayesian modelling of shared gene function., , , , and . Bioinformatics, 23 (15): 1936-1944 (2007)Belief in Information Flow., , and . CSFW, page 31-45. IEEE Computer Society, (2005)Civitas: Toward a Secure Voting System., , and . IEEE Symposium on Security and Privacy, page 354-368. IEEE Computer Society, (2008)Polyglot: An Extensible Compiler Framework for Java., , and . CC, volume 2622 of Lecture Notes in Computer Science, page 138-152. Springer, (2003)Belief semantics of authorization logic., and . ACM Conference on Computer and Communications Security, page 561-572. ACM, (2013)Quantifying Information Flow for Dynamic Secrets., , , and . IEEE Symposium on Security and Privacy, page 540-555. IEEE Computer Society, (2014)Nexus Authorization Logic (NAL): Logical Results, and . CoRR, (2012)Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ., , and . IACR Cryptology ePrint Archive, (2015)Temporal Logics for Hyperproperties., , , , , and . POST, volume 8414 of Lecture Notes in Computer Science, page 265-284. Springer, (2014)Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution., , , , and . ESORICS (2), volume 9327 of Lecture Notes in Computer Science, page 520-538. Springer, (2015)