Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The K-Observer Problem in Computer Networks., , , and . SSS, volume 6976 of Lecture Notes in Computer Science, page 5-18. Springer, (2011)Incremental Verification of Computing Policies., , and . SSS, volume 8756 of Lecture Notes in Computer Science, page 226-236. Springer, (2014)Predictable Internet Clients and In-Switch Deep Packet Inspection., , , and . ICCCN, page 1-10. IEEE, (2023)The best keying protocol for sensor networks., , and . WOWMOM, page 1-6. IEEE Computer Society, (2011)TPP: The Two-Way Password Protocol., , and . ICCCN, page 1-6. IEEE, (2011)Mending Wall: On the Implementation of Censorship in India., , , , and . SecureComm, volume 238 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 418-437. Springer, (2017)Maginot Lines and Tourniquets: On the Defendability of National Cyberspace., , , and . LCN Symposium, page 19-30. IEEE, (2020)Rules in play: On the complexity of routing tables and firewalls., , , and . ICNP, page 1-10. IEEE Computer Society, (2016)Analysis of Computing Policies Using SAT Solvers (Short Paper)., , , and . SSS, volume 10083 of Lecture Notes in Computer Science, page 190-194. (2016)Projection and Division: Linear-Space Verification of Firewalls., and . ICDCS, page 736-743. IEEE Computer Society, (2010)