From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attacks on Some RSA Signatures., и . CRYPTO, том 218 из Lecture Notes in Computer Science, стр. 18-27. Springer, (1985)Encoding and Manipulating Pictorial Data with S+-trees., , и . SSD, том 525 из Lecture Notes in Computer Science, стр. 401-419. Springer, (1991)Concurrent Access to B-Trees., и . PARBASE / Databases, стр. 37-54. IEEE Computer Society, (1990)The Logical Disk: A New Approach to Improving File Systems., , и . SOSP, стр. 15-28. ACM, (1993)Operating System Review 27(5).Roles and Dynamic Subclasses: A Modal Logic Approach., , и . ECOOP, том 821 из Lecture Notes in Computer Science, стр. 32-59. Springer, (1994)The identification of objects and roles - Object identifiers revisited, и . IR-267. Faculty of Mathematics and Computer Science, Vrije Universiteit, (1991)Privacy and security in information systems using programming language features, , , и . Information Systems, 8 (2): 95--103 (1983)Object Identifiers, Keys, and Surrogates: Object Identifiers Revisited., и . Theory Pract. Object Syst., 1 (2): 101-114 (1995)Privacy and Security in Distributed Database Systems., , и . DDSS, стр. 229-241. North-Holland, (1981)Atomic Recovery Units: Failure Atomicity for Logical Disks., , , и . ICDCS, стр. 26-37. IEEE Computer Society, (1996)