• 1092 Citations
  • 13 h-Index
19992020

Research output per year

If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Tachio Terauchi is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 2 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

  • 1092 Citations
  • 13 h-Index
  • 23 Conference contribution
  • 12 Article
  • 2 Paper
  • 2 Conference article

Failure of cut-elimination in cyclic proofs of separation logic

Kimura, D., Nakazawa, K., Terauchi, T. & Unno, H., 2020, In : Computer Software. 37, 1, p. 39-52 14 p.

Research output: Contribution to journalArticle

  • 2 Citations (Scopus)

    A Formal Analysis of Timing Channel Security via Bucketing

    Terauchi, T. & Antonopoulos, T., 2019 Jan 1, Principles of Security and Trust - 8th International Conference, POST 2019, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2019, Proceedings. Nielson, F. & Sands, D. (eds.). Springer-Verlag, p. 29-50 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11426 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Games for security under adaptive adversaries

    Antonopoulos, T. & Terauchi, T., 2019 Jun, Proceedings - 2019 IEEE 32nd Computer Security Foundations Symposium, CSF 2019. IEEE Computer Society, p. 216-229 14 p. 8823693. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2019-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A fixpoint logic and dependent effects for temporal property verification

    Nanjo, Y., Unno, H., Koskinen, E. & Terauchi, T., 2018 Jul 9, Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2018. Institute of Electrical and Electronics Engineers Inc., Vol. Part F138033. p. 759-768 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 6 Citations (Scopus)

    Compositional synthesis of leakage resilient programs

    Blot, A., Yamamoto, M. & Terauchi, T., 2017, Principles of Security and Trust - 6th International Conference, POST 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Springer Verlag, Vol. 10204 LNCS. p. 277-297 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10204 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 4 Citations (Scopus)