Author of the publication

Optimized OR-Sets without Ordering Constraints.

, , and . ICDCN, volume 8314 of Lecture Notes in Computer Science, page 227-241. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Existential Assertions for Voting Protocols., , and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 337-352. Springer, (2017)Bounded Version Vectors Using Mazurkiewicz Traces., , and . ACSS (1), volume 1178 of Advances in Intelligent Systems and Computing, page 31-42. Springer, (2020)Knowledge-based modelling of voting protocols., , and . TARK, page 62-71. (2007)Tagging Makes Secrecy Decidable with Unbounded Nonces as Well., and . FSTTCS, volume 2914 of Lecture Notes in Computer Science, page 363-374. Springer, (2003)Knowledge Transfer and Information Leakage in Protocols., , and . ATVA, volume 10482 of Lecture Notes in Computer Science, page 225-240. Springer, (2017)Who holds the best card? Secure communication of optimal secret bits., , , and . Australas. J Comb., (2021)Formalizing and Checking Multilevel Consistency., , , , and . VMCAI, volume 11990 of Lecture Notes in Computer Science, page 379-400. Springer, (2020)Bounded Implementations of Replicated Data Types., , and . VMCAI, volume 8931 of Lecture Notes in Computer Science, page 355-372. Springer, (2015)Effective Verification of Replicated Data Types Using Later Appearance Records (LAR)., , and . ATVA, volume 9364 of Lecture Notes in Computer Science, page 293-308. Springer, (2015)The Complexity of Disjunction in Intuitionistic Logic., , and . LFCS, volume 9537 of Lecture Notes in Computer Science, page 349-363. Springer, (2016)