Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting., , , , , , and . ACSAC, page 30-39. IEEE Computer Society, (2007)Dealing with Undependable Workers in Decentralized Network Supercomputing., , , and . ICDCN, volume 7730 of Lecture Notes in Computer Science, page 27-41. Springer, (2013)Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards., , , , , , , , and . EVT, USENIX Association, (2008)Dependable Decentralized Cooperation with the Help of Reliability Estimation., , and . SSS, volume 8756 of Lecture Notes in Computer Science, page 283-298. Springer, (2014)Brief announcement: self-stabilizing resource discovery algorithm., , and . PODC, page 116-118. ACM, (2013)Brief announcement: decentralized network supercomputing in the presence of malicious and crash-prone workers., , and . PODC, page 231-232. ACM, (2012)Self-stabilizing Resource Discovery Algorithm., , and . OPODIS, volume 8304 of Lecture Notes in Computer Science, page 129-144. Springer, (2013)Robust Network Supercomputing without Centralized Control., , and . OPODIS, volume 7109 of Lecture Notes in Computer Science, page 435-450. Springer, (2011)Coordinated Cooperative Work Using Undependable Processors with Unreliable Broadcast., , , and . PDP, page 17-26. IEEE Computer Society, (2014)Automating Voting Terminal Event Log Analysis., , , , , , , and . EVT/WOTE, USENIX Association, (2009)