Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Approximation and collusion in multicast cost sharing., , , , and . Games Econ. Behav., 47 (1): 36-71 (2004)Flexibility as an Instrument in Digital Rights Management., , , and . WEIS, (2005)An Approximate L1-Difference Algorithm for Massive Data Streams., , , and . SIAM J. Comput., 32 (1): 131-151 (2002)Probabilistically checkable debate systems and approximation algorithms for PSPACE-hard functions., , , and . STOC, page 305-314. ACM, (1993)Computation in a distributed information market., , , and . EC, page 156-165. ACM, (2003)Avoiding The Man on the Wire: Improving Tor's Security with Trust-Aware Path Selection., , , , and . NDSS, The Internet Society, (2017)Cryptographic Protection of Databases and Software., , and . Distributed Computing And Cryptography, volume 2 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 161-172. DIMACS/AMS, (1989)Information accountability., , , , , and . Commun. ACM, 51 (6): 82-87 (2008)A Game-Theoretic Classification of Interactive Complexity Classes., , and . SCT, page 227-237. IEEE Computer Society, (1995)Lower Bounds on Random-Self-Reducibility., , and . SCT, page 100-109. IEEE Computer Society, (1990)