Author of the publication

Bounded Version Vectors Using Mazurkiewicz Traces.

, , and . ACSS (1), volume 1178 of Advances in Intelligent Systems and Computing, page 31-42. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowledge-based modelling of voting protocols., , and . TARK, page 62-71. (2007)Knowledge Transfer and Information Leakage in Protocols., , and . ATVA, volume 10482 of Lecture Notes in Computer Science, page 225-240. Springer, (2017)Tagging Makes Secrecy Decidable with Unbounded Nonces as Well., and . FSTTCS, volume 2914 of Lecture Notes in Computer Science, page 363-374. Springer, (2003)Who holds the best card? Secure communication of optimal secret bits., , , and . Australas. J Comb., (2021)Bounded Implementations of Replicated Data Types., , and . VMCAI, volume 8931 of Lecture Notes in Computer Science, page 355-372. Springer, (2015)Formalizing and Checking Multilevel Consistency., , , , and . VMCAI, volume 11990 of Lecture Notes in Computer Science, page 379-400. Springer, (2020)Bounded Version Vectors Using Mazurkiewicz Traces., , and . ACSS (1), volume 1178 of Advances in Intelligent Systems and Computing, page 31-42. Springer, (2020)Existential Assertions for Voting Protocols., , and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 337-352. Springer, (2017)Effective Verification of Replicated Data Types Using Later Appearance Records (LAR)., , and . ATVA, volume 9364 of Lecture Notes in Computer Science, page 293-308. Springer, (2015)The Complexity of Disjunction in Intuitionistic Logic., , and . LFCS, volume 9537 of Lecture Notes in Computer Science, page 349-363. Springer, (2016)