Author of the publication

Analyzing Conflicts and Dependencies of Rule-Based Transformations in Henshin.

, , , and . FASE, volume 9033 of Lecture Notes in Computer Science, page 165-168. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Survey of Web Content Control for Generative AI., , and . WOWS@ECIR, volume 3689 of CEUR Workshop Proceedings, page 2-13. CEUR-WS.org, (2024)Computing Riemann-Roch Spaces in Algebraic Function Fields and Related Topics.. J. Symb. Comput., 33 (4): 425-445 (2002)Pairing Lattices.. Pairing, volume 5209 of Lecture Notes in Computer Science, page 18-38. Springer, (2008)Hyperelliptic Pairings., , and . Pairing, volume 4575 of Lecture Notes in Computer Science, page 108-131. Springer, (2007)An Algorithm for Computing Weierstrass Points.. ANTS, volume 2369 of Lecture Notes in Computer Science, page 357-371. Springer, (2002)Efficient Identity Based Signature Schemes Based on Pairings.. Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 310-324. Springer, (2002)The GHS Attack Revisited.. EUROCRYPT, volume 2656 of Lecture Notes in Computer Science, page 374-387. Springer, (2003)The Eta Pairing Revisited., , and . IEEE Trans. Inf. Theory, 52 (10): 4595-4602 (2006)Optimised Versions of the Ate and Twisted Ate Pairings., , , and . IMACC, volume 4887 of Lecture Notes in Computer Science, page 302-312. Springer, (2007)Two Topics in Hyperelliptic Cryptography., , and . Selected Areas in Cryptography, volume 2259 of Lecture Notes in Computer Science, page 181-189. Springer, (2001)