Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collaboration of untrusting peers with changing interests., , , and . EC, page 112-119. ACM, (2004)Timing Games and Shared Memory., , and . DISC, volume 3724 of Lecture Notes in Computer Science, page 507-508. Springer, (2005)Hierarchical Correctness Proofs for Distributed Algorithms., and . PODC, page 137-151. ACM, (1987)Knowledge, Probability, and Adversaries., and . PODC, page 103-118. ACM, (1989)A Semantics for a Logic of Authentication (Extended Abstract)., and . PODC, page 201-216. ACM, (1991)A Theory of Redo Recovery., and . SIGMOD Conference, page 397-406. ACM, (2003)SMT-Based System Verification with DVF., , , and . SMT@IJCAR, volume 20 of EPiC Series in Computing, page 32-43. EasyChair, (2012)Protocol Proof Checking Simplified with SMT., and . NCA, page 195-202. IEEE Computer Society, (2012)Common Knowledge and Consistent Simultaneous Coordination., and . Distributed Comput., 6 (3): 181-192 (1993)Redo Recovery after System Crashes., and . VLDB, page 457-468. Morgan Kaufmann, (1995)