Author of the publication

Structural Subsumption Considered from an Automata-Theoretic Point of View.

, , and . Description Logics, volume 11 of CEUR Workshop Proceedings, CEUR-WS.org, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Formal Definition of Online Abuse-Freeness., , and . SecureComm, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 484-497. Springer, (2010)Extensions to Description Logics., , and . Description Logic Handbook, Cambridge University Press, (2003)On the Relationships Between Notions of Simulation-Based Security., , , and . IACR Cryptology ePrint Archive, (2006)Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach., and . ACM Conference on Computer and Communications Security, page 129-138. ACM, (2008)iUC: Flexible Universal Composability Made Simple., , , and . ASIACRYPT (3), volume 11923 of Lecture Notes in Computer Science, page 191-221. Springer, (2019)PrivatEyes: Appearance-based Gaze Estimation Using Federated Secure Multi-Party Computation., , , , , and . CoRR, (2024)The IITM Model: A Simple and Expressive Model for Universal Composability., , and . J. Cryptol., 33 (4): 1461-1584 (2020)Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation., , and . J. Cryptol., 33 (4): 1585-1658 (2020)A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols., , and . ESORICS, volume 4734 of Lecture Notes in Computer Science, page 422-437. Springer, (2007)Convolutions in Overdrive: Maliciously Secure Convolutions for MPC., , , and . IACR Cryptol. ePrint Arch., (2023)