From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Thrifty Execution of Task Pipelines., , и . Acta Inf., 22 (1): 35-45 (1985)More on Master Keys for Group Sharing., , и . Inf. Process. Lett., 13 (3): 125-126 (1981)On Language Restrictions to Ensure Deterministic Behavior in Concurrent Systems., и . Jerusalem Conference on Information Technology, стр. 537-541. North-Holland, (1978)Automated Analysis of Fault-Tolerance in Distributed Systems., и . Formal Methods Syst. Des., 26 (2): 183-196 (2005)Breaking-in Research.. IEEE Secur. Priv., 11 (2): 3-4 (2013)Implementing Trustworthy Services Using Replicated State Machines., и . IEEE Secur. Priv., 3 (5): 34-43 (2005)Time Out for Station Identification.. IEEE Secur. Priv., 2 (5): 5 (2004)Federated Identity Management Systems: A Privacy-Based Characterization., и . IEEE Secur. Priv., 11 (5): 36-48 (2013)Equational Propositional Logic., и . Inf. Process. Lett., 53 (3): 145-152 (1995)Technical Perspective: IronFleet simplifies proving safety and liveness properties.. Commun. ACM, 60 (7): 82 (2017)