Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SBFT: A Scalable and Decentralized Trust Infrastructure., , , , , , , , and . DSN, page 568-580. IEEE, (2019)Compact name-independent routing with minimum stretch., , , , and . SPAA, page 20-24. ACM, (2004)Using petal-decompositions to build a low stretch spanning tree., and . STOC, page 395-406. ACM, (2012)Fully dynamic approximate distance oracles for planar graphs via forbidden-set distance labels., , and . STOC, page 1199-1218. ACM, (2012)Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus., , , , and . OPODIS, volume 95 of LIPIcs, page 25:1-25:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2017)Low-Distortion Inference of Latent Similarities from a Multiplex Social Network., , , and . SIAM J. Comput., 44 (3): 617-668 (2015)Practical Synchronous Byzantine Consensus., , , and . IACR Cryptology ePrint Archive, (2017)LAND: stretch (1 + epsilon) locality-aware networks for DHTs., , and . SODA, page 550-559. SIAM, (2004)Distributed SSH Key Management with Proactive RSA Threshold Signatures., , and . ACNS, volume 10892 of Lecture Notes in Computer Science, page 22-43. Springer, (2018)Volume in General Metric Spaces., , , and . ESA (2), volume 6347 of Lecture Notes in Computer Science, page 87-99. Springer, (2010)