Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal Implementation of Value Commitment., , and . ESOP, volume 4960 of Lecture Notes in Computer Science, page 383-397. Springer, (2008)The Reflexive CHAM and the Join-Calculus., and . Proceedings of the 23rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, page 372-385. Association for Computing Machinery, (1996)Verified Cryptographic Implementations for TLS, , , and . ACM Trans. Inf. Syst. Secur., 15 (1): 3:1--3:32 (March 2012)A Calculus of Mobile Agents., , , , and . CONCUR, volume 1119 of Lecture Notes in Computer Science, page 406-421. Springer, (1996)JoCaml: A Language for Concurrent Distributed and Mobile Programming., , , and . Advanced Functional Programming, volume 2638 of Lecture Notes in Computer Science, page 129-158. Springer, (2002)A Top-Down Look at a Secure Message., , and . FSTTCS, volume 1738 of Lecture Notes in Computer Science, page 122-141. Springer, (1999)Private authentication., and . Theor. Comput. Sci., 322 (3): 427-476 (2004)The Join Calculus: A Language for Distributed Mobile Programming., and . APPSEM, volume 2395 of Lecture Notes in Computer Science, page 268-332. Springer, (2000)PAC: Practical Accountability for CCF., , , , , , , , , and 2 other author(s). CoRR, (2021)Key-schedule Security for the TLS 1.3 Standard., , , , , and . IACR Cryptol. ePrint Arch., (2021)