<--- Back to Details
First PageDocument Content
Formal sciences / International Conference on Logic Programming / Logic programming / Association for Computing Machinery / CiteSeer / Federated Logic Conference / International Symposium on Logic-based Program Synthesis and Transformation / Logic / Lecture Notes in Computer Science / Computer science / Science / Computing
Date: 2011-08-06 12:15:35
Formal sciences
International Conference on Logic Programming
Logic programming
Association for Computing Machinery
CiteSeer
Federated Logic Conference
International Symposium on Logic-based Program Synthesis and Transformation
Logic
Lecture Notes in Computer Science
Computer science
Science
Computing

Manuel Hermenegildo Areas of Interest Advanced Program Development Technology, Global Program Analysis / Optimization / Verification, Abstract Interpretation, Abstract Machines, Parallelizing Compilers, Resource-Aware Di

Add to Reading List

Source URL: clip.dia.fi.upm.es

Download Document from Source Website

File Size: 253,89 KB

Share Document on Facebook

Similar Documents

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

DocID: 1xVS4 - View Document

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

DocID: 1xVAE - View Document

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

DocID: 1xTNj - View Document

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

DocID: 1xTyQ - View Document

Consent to Publish  123 Lecture Notes in Computer Science

Consent to Publish 123 Lecture Notes in Computer Science

DocID: 1vnVU - View Document