Search for persons
X
?
Proceedings of the 45th International Symposium on Symbolic and Algebraic Computation ,
2
An additive decomposition in logarithmic towers and beyond:
, In:
?
Proceedings of the 14th International Conference on Availability, Reliability and Security ,
3
Costing Secure Software Development : A Systematic Mappi..:
, In:
?
Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science ,
4
Synchronous, with a Chance of Partition Tolerance:
, In:
?
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms ,
5
Cache-Oblivious and Data-Oblivious Sorting and Applications:
, In:
?
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms ,
6
Cache-oblivious and data-oblivious sorting and applications:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
7
Game Theoretic Notions of Fairness in Multi-party Coin Toss:
, In:
?