Search for persons
X
?
Lecture Notes in Computer Science; Stabilization, Safety, and Security of Distributed Systems ,
1
Robust Overlays Meet Blockchains: On Handling High Churn an..:
, In:
?
2023 Fifth International Conference on Blockchain Computing and Applications (BCCA) ,
2
Schooling to Exploit Foolish Contracts:
, In:
?
Computer Aided Verification; Lecture Notes in Computer Science ,
3
Functional Correctness of C Implementations of Dijkstra's, ..:
, In:
?
Computer Aided Verification; Lecture Notes in Computer Science ,
4
Reasoning over Permissions Regions in Concurrent Separation..:
, In:
?
Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs ,
5
A functional proof pearl: inverting the Ackermann hierarchy:
, In:
?
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis ,
7
Exploiting the laws of order in smart contracts:
, In:
?
Programming Languages and Systems; Lecture Notes in Computer Science ,
9
Pumping, with or Without Choice:
, In:
?
Lecture Notes in Computer Science; Leveraging Applications of Formal Methods, Verification and Validation. Industrial Practice ,
10
Temporal Properties of Smart Contracts:
, In:
?
Programming Languages and Systems; Lecture Notes in Computer Science ,
11
Complexity Analysis of Tree Share Structure:
, In:
?
Programming Languages and Systems; Lecture Notes in Computer Science ,
12
Logical Reasoning for Disjoint Permissions:
, In:
?
Proceedings of the 34th Annual Computer Security Applications Conference ,
13
Finding The Greedy, Prodigal, and Suicidal Contracts at Sca..:
, In:
?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ,
14
Making Smart Contracts Smarter:
, In:
?
2015 IEEE 28th Computer Security Foundations Symposium ,
15