From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Quantitative Information Flow in Boolean Programs., , и . POST, том 8414 из Lecture Notes in Computer Science, стр. 103-119. Springer, (2014)Modular Verification of Protocol Equivalence in the Presence of Randomness., , и . ESORICS (1), том 10492 из Lecture Notes in Computer Science, стр. 187-205. Springer, (2017)Formal Analysis of Vote Privacy Using Computationally Complete Symbolic Attacker., , и . ESORICS (2), том 11099 из Lecture Notes in Computer Science, стр. 350-372. Springer, (2018)Probabilistic Büchi Automata with Non-extremal Acceptance Thresholds., , и . VMCAI, том 6538 из Lecture Notes in Computer Science, стр. 103-117. Springer, (2011)Deciding Accuracy of Differential Privacy Schemes., , , , и . CoRR, (2020)Exact quantitative probabilistic model checking through rational search., , , , и . Formal Methods Syst. Des., 56 (1): 90-126 (2020)Modelchecking Safety Properties in Randomized Security Protocols., , и . Logic, Language, and Security, том 12300 из Lecture Notes in Computer Science, стр. 167-183. Springer, (2020)Deciding Differential Privacy of Online Algorithms with Multiple Variables., , , и . CCS, стр. 1761-1775. ACM, (2023)Exact quantitative probabilistic model checking through rational search., , , , и . FMCAD, стр. 92-99. IEEE, (2017)Enhancing Computing Curricular Outcomes and Student Accomplishments Through Collegiate Competitions., , , , , и . CompEd (1), стр. 22-28. ACM, (2023)