From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Studies on the Ground Convergence Property of Conditional Theories., и . AMAST, стр. 363-376. Springer, (1991)Complexity results for security protocols with Diffie-Hellman exponentiation and commuting public key encryption., , , и . ACM Trans. Comput. Log., 9 (4): 24:1-24:52 (2008)Network Structure Release under Differential Privacy., , и . Trans. Data Priv., 9 (3): 215-241 (2016)Path of Subterms Ordering and Recursive Decomposition Ordering Revisited.. J. Symb. Comput., 3 (1/2): 117-131 (1987)Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks., , , , , и . NOMS, стр. 1-9. IEEE, (2022)Online Attacks on Picture Owner Privacy., , и . DEXA (2), том 12392 из Lecture Notes in Computer Science, стр. 33-47. Springer, (2020)Rewrite based Verification of XML Updates, и . CoRR, (2009)Any Gound Associative-Commutative Theory Has a Finite Canonical System., и . RTA, том 488 из Lecture Notes in Computer Science, стр. 423-434. Springer, (1991)A Proof System for Conditional Algebraic Specifications., и . CTRS, том 516 из Lecture Notes in Computer Science, стр. 51-63. Springer, (1990)On Word Problems in Horn Theories., и . CADE, том 310 из Lecture Notes in Computer Science, стр. 527-537. Springer, (1988)