From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Black-box Optimization of Adversarial Windows Malware with Constrained Manipulations., , , , и . CoRR, (2020)Constraint Solving in Logic Programming and in Automated Deduction: A Comparison., , и . AIMSA, том 1480 из Lecture Notes in Computer Science, стр. 28-38. Springer, (1998)The eureka tool for software model checking., , , , и . ASE, стр. 541-542. ACM, (2007)Rewriting and Decision Procedure Laboratory: Combining Rewriting, Satisfiability Checking, and Lemma Speculation., , и . Mechanizing Mathematical Reasoning, том 2605 из Lecture Notes in Computer Science, стр. 30-45. Springer, (2005)Preface., , и . J. Autom. Reason., 45 (2): 89 (2010)Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps., , , , и . FMSE, стр. 1-10. ACM, (2008)An action-based approach to the formal specification and automatic analysis of business processes under authorization constraints., , , и . J. Comput. Syst. Sci., 78 (1): 119-141 (2012)Visual representation of natural language scene descriptions., , , и . IEEE Trans. Syst. Man Cybern. Part B, 26 (4): 575-589 (1996)Anatomy of the Facebook solution for mobile single sign-on: Security assessment and improvements., , , и . Comput. Secur., (2017)Model checking authorization requirements in business processes., и . Comput. Secur., (2014)