Author of the publication

Teaching how to program using automated assessment and functional glossy games (experience report).

, , , , and . Proc. ACM Program. Lang., 2 (ICFP): 82:1-82:17 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Formal verification of side-channel countermeasures using self-composition., , , and . Sci. Comput. Program., 78 (7): 796-812 (2013)Teaching how to program using automated assessment and functional glossy games (experience report)., , , , and . Proc. ACM Program. Lang., 2 (ICFP): 82:1-82:17 (2018)The Last Mile: High-Assurance and High-Speed Cryptographic Implementations., , , , , , , and . CoRR, (2019)Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks., , , , , and . CSF, page 132-146. IEEE Computer Society, (2018)Bounded Version Vectors., , and . DISC, volume 3274 of Lecture Notes in Computer Science, page 102-116. Springer, (2004)Verifying Cryptographic Software Correctness with Respect to Reference Implementations., , , and . FMICS, volume 5825 of Lecture Notes in Computer Science, page 37-52. Springer, (2009)A Machine-Checked Proof of Security for AWS Key Management Service., , , , , , , , , and . CCS, page 63-78. ACM, (2019)A Tool for Programming with Interaction Nets., , and . Electron. Notes Theor. Comput. Sci., (2008)A Tool-Chain for High-Assurance Cryptographic Software., , , and . ERCIM News, (2016)Deductive verification of cryptographic software., , , and . ISSE, 6 (3): 203-218 (2010)