Author of the publication

Functional Instantiation in First-Order Logic.

, , , and . Artificial and Mathematical Theory of Computation, page 7-26. Academic Press / Elsevier, (1991)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protocols Using Anonymous Connections: Mobile Applications., , and . Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, page 13-23. Springer, (1997)Mechanizing Unity.. Programming Concepts and Methods, page 387-414. North-Holland, (1990)Private Web Browsing., , and . J. Comput. Secur., 5 (3): 237-248 (1997)A Mechanization of Unity in PC-NQTHM-92.. J. Autom. Reason., 23 (3-4): 445-498 (1999)Hiding Routing Information., , and . Information Hiding, volume 1174 of Lecture Notes in Computer Science, page 137-150. Springer, (1996)Beyond Cryptographic Conditional Access., and . Smartcard, USENIX Association, (1999)Functional Instantiation in First-Order Logic., , , and . Artificial and Mathematical Theory of Computation, page 7-26. Academic Press / Elsevier, (1991)Towards a model of storage jamming., and . CSFW, page 176-. IEEE Computer Society, (1996)Temporarily hidden bit commitment and lottery applications., , and . Int. J. Inf. Sec., 9 (1): 33-50 (2010)Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits.. CAV, volume 575 of Lecture Notes in Computer Science, page 354-364. Springer, (1991)