From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Adaptation of Proof-Planning to Declarer Play in Bridge., , и . ECAI, стр. 72-76. John Wiley and Sons, (1992)A Conservative Extension of First-order Logic and Its Application to Theorem Proving., и . FSTTCS, том 761 из Lecture Notes in Computer Science, стр. 151-160. Springer, (1993)Verification Of Combinational Logic in Nuprl., и . Hardware Specification, Verification and Synthesis, том 408 из Lecture Notes in Computer Science, стр. 333-357. Springer, (1989)Locality-Sensitive Hashing Does Not Guarantee Privacy! Attacks on Google's FLoC and the MinHash Hierarchy System., , , и . CoRR, (2023)Enforcing the GDPR., , и . ESORICS (2), том 14345 из Lecture Notes in Computer Science, стр. 400-422. Springer, (2023)Sound Verification of Security Protocols: From Design to Interoperable Implementations., , , , , , , и . SP, стр. 1077-1093. IEEE, (2023)Formal Methods for Payment Protocols.. AsiaCCS, стр. 326. ACM, (2023)Dispute Resolution in Voting., , и . CSF, стр. 1-16. IEEE, (2020)Secure data deletion from persistent media., , , и . ACM Conference on Computer and Communications Security, стр. 271-284. ACM, (2013)Editorial., , и . High. Order Symb. Comput., 17 (3): 171 (2004)