Personensuche
X
?
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies ,
1
Converting Rule-Based Access Control Policies: From Complem..:
, In:
?
Frontiers of Combining Systems; Lecture Notes in Computer Science ,
3
Algorithmic Problems in the Symbolic Approach to the Verifi..:
, In:
?
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies ,
4
Towards a Theory for Semantics and Expressiveness Analysis ..:
, In:
?
Frontiers of Combining Systems; Lecture Notes in Computer Science ,
6
Reviving Basic Narrowing Modulo:
, In:
?
Frontiers of Combining Systems; Lecture Notes in Computer Science ,
7
On Asymmetric Unification for the Theory of XOR with a Homo..:
, In:
?
Lecture Notes in Computer Science; Automated Deduction – CADE 27 ,
8
Unification Modulo Lists with Reverse Relation with Certain..:
, In:
?
Lecture Notes in Computer Science; Description Logic, Theory Combination, and All That ,
9
Asymmetric Unification and Disunification:
, In:
?
Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming ,
10
Theories of Homomorphic Encryption, Unification, and the Fi..:
, In:
?
Proceedings of the 13th international ACM SIGPLAN symposium on Principles and practices of declarative programming ,
12
Protocol analysis in Maude-NPA using unification modulo hom..:
, In:
?
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security ,
14