Author of the publication

Hierarchical Combination of Intruder Theories.

, and . RTA, volume 4098 of Lecture Notes in Computer Science, page 108-122. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Studies on the Ground Convergence Property of Conditional Theories., and . AMAST, page 363-376. Springer, (1991)On Word Problems in Horn Theories., and . CADE, volume 310 of Lecture Notes in Computer Science, page 527-537. Springer, (1988)Matching a Set of Strings with Variable Length don't Cares., and . Theor. Comput. Sci., 178 (1-2): 129-154 (1997)Any Gound Associative-Commutative Theory Has a Finite Canonical System., and . RTA, volume 488 of Lecture Notes in Computer Science, page 423-434. Springer, (1991)A Proof System for Conditional Algebraic Specifications., and . CTRS, volume 516 of Lecture Notes in Computer Science, page 51-63. Springer, (1990)Matching a Set of Strings with Variable Length Don't Cares., and . CPM, volume 937 of Lecture Notes in Computer Science, page 230-247. Springer, (1995)Preferring diagnoses by abduction., , and . IEEE Trans. Syst. Man Cybern., 23 (3): 792-808 (1993)Automatically Distributing and Updating In-Network Management Rules for Software Defined Networks., , , , , and . NOMS, page 1-9. IEEE, (2022)Online Attacks on Picture Owner Privacy., , and . DEXA (2), volume 12392 of Lecture Notes in Computer Science, page 33-47. Springer, (2020)Path of Subterms Ordering and Recursive Decomposition Ordering Revisited.. J. Symb. Comput., 3 (1/2): 117-131 (1987)