From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Conditional Probabilities over Probabilistic and Nondeterministic Systems., и . TACAS, том 4963 из Lecture Notes in Computer Science, стр. 157-172. Springer, (2008)Safe Equivalences for Security Properties., , , и . IFIP TCS, том 323 из IFIP Advances in Information and Communication Technology, стр. 55-70. Springer, (2010)Computing the Leakage of Information-Hiding Systems., , , и . TACAS, том 6015 из Lecture Notes in Computer Science, стр. 373-389. Springer, (2010)Significant Diagnostic Counterexamples in Probabilistic Model Checking., , и . Haifa Verification Conference, том 5394 из Lecture Notes in Computer Science, стр. 129-148. Springer, (2008)Provable anonymity., , , и . FMSE, стр. 63-72. ACM, (2005)An Incremental and Layered Procedure for the Satisfiability of Linear Arithmetic Logic., , , , , , и . TACAS, том 3440 из Lecture Notes in Computer Science, стр. 317-333. Springer, (2005)Efficient Satisfiability Modulo Theories via Delayed Theory Combination., , , , , , и . CAV, том 3576 из Lecture Notes in Computer Science, стр. 335-349. Springer, (2005)Modeling Privacy for Off-Line RFID Systems., и . CARDIS, том 6035 из Lecture Notes in Computer Science, стр. 194-208. Springer, (2010)Information Hiding in Probabilistic Concurrent Systems., , , и . QEST, стр. 17-26. IEEE Computer Society, (2010)Computational Soundness of Non-Malleable Commitments., , и . ISPEC, том 4991 из Lecture Notes in Computer Science, стр. 361-376. Springer, (2008)